Password authentication with insecure communication
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme
NWESP '05 Proceedings of the International Conference on Next Generation Web Services Practices
Vulnerabilities of Wu-Chieu's Improved Password Authentication Scheme Using Smart Cards
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A simple remote user authentication scheme
Mathematical and Computer Modelling: An International Journal
A modified remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A dynamic ID-based remote user authentication scheme
IEEE Transactions on Consumer Electronics
A remote password authentication scheme for multiserver architecture using neural networks
IEEE Transactions on Neural Networks
A secure dynamic identity based authentication protocol for multi-server architecture
Journal of Network and Computer Applications
Timestamp based authentication protocol for smart card using ECC
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Review: Dynamic ID-based remote user password authentication schemes using smart cards: A review
Journal of Network and Computer Applications
Encrypted remote user authentication scheme by using smart card
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
Modified efficient and secure dynamic ID-Based user authentication scheme
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Advanced remote user authentication protocol for multi-server architecture based on ECC
Journal of Information Security and Applications
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 0.00 |
In 2005, Liao et al pointed out the weaknesses of Das et al.'s dynamic ID-based remote user authentication scheme using smart cards, and then proposed a slight modification thereof to overcome these weaknesses The current paper, however, demonstrates that Liao et al.'s scheme is still vulnerable to reflection attacks, privileged insider's attacks, and impersonation attacks by using lost or stolen smart card Then, we present an improvement to the scheme in order to isolate such problems.