Password authentication without using a password table
Information Processing Letters
A remote password authentication scheme based upon ElGamal's signature scheme
Computers and Security
“Paramita wisdom” password authentication scheme without verification tables
Journal of Systems and Software
Password authentication with insecure communication
Communications of the ACM
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Research note: Cryptanalysis of a remote login authentication scheme
Computer Communications
Security enhancement for Optimal Strong-Password Authentication protocol
ACM SIGOPS Operating Systems Review
Security enhancement for optimal strong-password authentication protocol
ACM SIGOPS Operating Systems Review
A simple password authentication using a polynomial
ACM SIGOPS Operating Systems Review
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
A Secure Strong-Password Authentication Protocol
Fundamenta Informaticae
A more efficient and secure dynamic ID-based remote user authentication scheme
Computer Communications
Computer Standards & Interfaces
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Cryptanalysis of a remote user authentication scheme using smart cards
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
New Remote Mutual Authentication Scheme using Smart Cards
Transactions on Data Privacy
A novel user-participating authentication scheme
Journal of Systems and Software
Vulnerabilities in a remote agent authentication scheme using smart cards
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
WSEAS Transactions on Information Science and Applications
An exquisite authentication scheme with key agreement preserving user anonymity
WISM'10 Proceedings of the 2010 international conference on Web information systems and mining
Remote authentication with forward security
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Improving the dynamic ID-Based remote mutual authentication scheme
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Attacking and improving on lee and chiu’s authentication scheme using smart cards
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
An efficient and complete remote user authentication scheme using smart cards
Mathematical and Computer Modelling: An International Journal
A Secure Strong-Password Authentication Protocol
Fundamenta Informaticae
Attacks and countermeasures in wireless cellular networks
Proceedings of the 2012 Information Security Curriculum Development Conference
Integrated OTP-based user authentication and access control scheme in home networks
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications
International Journal of Interdisciplinary Telecommunications and Networking
The Journal of Supercomputing
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 0.98 |
In this article, we propose a simple remote user authentication scheme using smart cards. This scheme has the following features. First, it does not require any password or verification tables. Second, it can withstand the message replay attack. Third, any legal users can arbitrarily choose and change their own passwords at will. And finally, the password of a user is not revealed to the server. In addition, the computational costs of this scheme are less than those of any previously proposed schemes.