Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Undetectable on-line password guessing attacks
ACM SIGOPS Operating Systems Review
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Password authentication with insecure communication
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
Cryptanalysis of a password authentication scheme over insecure networks
Journal of Computer and System Sciences
A new mutual authentication scheme based on nonce and smart cards
Computer Communications
Two-factor mutual authentication based on smart cards and passwords
Journal of Computer and System Sciences
A remote user authentication scheme without using smart cards
Computer Standards & Interfaces
A more efficient and secure dynamic ID-based remote user authentication scheme
Computer Communications
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
More secure remote user authentication scheme
Computer Communications
A simple and efficient key exchange scheme against the smart card loss problem
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Efficient password authenticated key agreement using bilinear pairings
Mathematical and Computer Modelling: An International Journal
Efficient multi-server password authenticated key agreement using smart cards
IEEE Transactions on Consumer Electronics
Robust smart-cards-based user authentication scheme with user anonymity
Security and Communication Networks
On the security of an improved password authentication scheme based on ECC
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme
International Journal of Communication Systems
Advanced remote user authentication protocol for multi-server architecture based on ECC
Journal of Information Security and Applications
Wireless Personal Communications: An International Journal
Hi-index | 0.24 |
In ubiquitous computing environments, people may obtain their services from application servers by using mobile devices at any time and anywhere. For convenience, most of those devices are small and of limited power and computation capacity. In this paper, we propose a robust user authentication and key agreement scheme suitable for ubiquitous computing environments. The main merits include: (1) a security-sensitive verification table is not required in the server; (2) the password can be chosen and changed freely by the clients and cannot be derived by the privileged administrator of the server; (3) all well-known security threats are solved in our proposed scheme; (4) the scheme does not have a serious time-synchronization problem; (5) the client and the server can establish a common session key; (6) the scheme is practical and efficient; (7) the scheme can preserve the privacy of the client's secret key even if the secret information stored in a smart card is compromised.