Cryptanalysis of a flexible remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
A secure dynamic ID based remote user authentication scheme for multi-server environment
Computer Standards & Interfaces
Computer Standards & Interfaces
Efficient remote user authentication scheme using smart card
Computer Networks: The International Journal of Computer and Telecommunications Networking
DoS-resistant ID-based password authentication scheme using smart cards
Journal of Systems and Software
New Remote Mutual Authentication Scheme using Smart Cards
Transactions on Data Privacy
Journal of Network and Computer Applications
Security enhancement on an improvement on two remote user authentication schemes using smart cards
Future Generation Computer Systems
Password based remote authentication scheme using ECC for smart card
Proceedings of the 2011 International Conference on Communication, Computing & Security
A smart card based user authentication scheme for multi-server environment
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
An improved lu-cao's remote user authentication scheme using smart card
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Remote authentication with forward security
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Security enhancement for password authentication schemes with smart cards
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Efficient remote user authentication and key establishment for multi-server environment
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
An efficient and complete remote user authentication scheme using smart cards
Mathematical and Computer Modelling: An International Journal
Security vulnerabilities of user authentication scheme using smart card
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
On the analysis and design of a family tree of smart card based user authentication schemes
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Future Generation Computer Systems
A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce
Journal of Medical Systems
Hi-index | 0.43 |
We present a cryptanalysis of a remote user authentication scheme proposed by Hwang and Li (see ibid., vol.46, no.1, p.28-31, 2000). We show that Hwang-Li's scheme is breakable. A legitimate user can impersonate other legal users and pass the system authentication