Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Understanding the use of passwords
Computers and Security
A survey of password mechanisms: weaknesses and potential improvements. part 2
Computers and Security
Security for computer networks: and introduction to data security in teleprocessing and electronic funds transfer (2nd ed.)
Password authentication using Newton's interpolating polynomials
Information Systems
IEEE Spectrum
Timestamps in key distribution protocols
Communications of the ACM
Password authentication with insecure communication
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
A high security log-in procedure
Communications of the ACM
A Flexible User Authentication Scheme for Multi-server Internet Services
ICN '01 Proceedings of the First International Conference on Networking-Part 1
Remarks on fingerprint-based remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Security enhancement of an IC-card-based remote login mechanism
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information Sciences: an International Journal
New Remote Mutual Authentication Scheme using Smart Cards
Transactions on Data Privacy
Password based remote authentication scheme using ECC for smart card
Proceedings of the 2011 International Conference on Communication, Computing & Security
Security enhancement for password authentication schemes with smart cards
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
A simple remote user authentication scheme
Mathematical and Computer Modelling: An International Journal
Research note: Cryptanalysis of a remote login authentication scheme
Computer Communications
Research note: Remote password authentication scheme based on cross-product
Computer Communications
Hi-index | 0.24 |
A smart card-oriented remote login authentication scheme is presented. The proposed scheme can be divided into three phases: registration, login and authentication. In the registration phase, the registering user chooses a password only known to himself. The central authority (CA) assigns an identity for the user, and delivers a smart card to the registered user. The smart card contains some necessary public parameters used in the login and authentication phases. Based on some simple properties of Euclidean geometry, the login and authentication phases can be achieved easily. Impersonation and replay attacks on the proposed scheme are discussed.