Understanding the use of passwords
Computers and Security
ACM Transactions on Computer Systems (TOCS)
A high security log-in procedure
Communications of the ACM
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
User authentication scheme with privacy-preservation for multi-server environment
IEEE Communications Letters
Robust one-time password authentication scheme using smart card for home network environment
Computer Communications
A strong user authentication scheme with smart cards for wireless communications
Computer Communications
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Efficient multi-server password authenticated key agreement using smart cards
IEEE Transactions on Consumer Electronics
Anonymous channel and authentication in wireless communications
Computer Communications
Research note: Remote password authentication scheme based on cross-product
Computer Communications
A remote password authentication scheme for multiserver architecture using neural networks
IEEE Transactions on Neural Networks
Hi-index | 0.00 |
Remote user authentication is used to validate the legitimacy of a remote log-in user. Due to the rapid growth of computer networks, many network environments have been becoming multi-server based. Recently, much research has been focused on proposing remote password authentication schemes based on smart cards for securing multi-server environments. Each of these schemes used either a nonce or a timestamp technique to prevent the replay attack. However, using the nonce technique to withstand the replay attack is potentially susceptible to the man-in-the-middle attack. Alternatively, when employing the timestamp method to secure remote password authentication, it will require the cost of implementing clock synchronization. In order to solve the above two issues, this paper proposes a self-verified timestamp technique to help the smart-card-based authentication scheme not only effectively achieve password-authenticated key agreement but also avoid the difficulty of implementing clock synchronization in multi-server environments. A secure authenticated key agreement should accomplish both mutual authentication and session key establishment. Therefore, in this paper we further give the formal proof on the execution of the proposed authenticated key agreement scheme.