Cryptanalysis of a flexible remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review
Improving the security of 'a flexible biometrics remote user authentication scheme'
Computer Standards & Interfaces
A secure dynamic ID based remote user authentication scheme for multi-server environment
Computer Standards & Interfaces
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Efficient remote user authentication scheme using smart card
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cryptanalysis and improvement on remote user mutual authentication scheme with smart cards
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
A smart card based user authentication scheme for multi-server environment
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
An improved lu-cao's remote user authentication scheme using smart card
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Remote authentication with forward security
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
An efficient and practical fingerprint-based remote user authentication scheme with smart cards
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A novel remote user authentication scheme using interacting neural network
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part I
Efficient remote user authentication and key establishment for multi-server environment
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part III
Security enhanced user authentication scheme for wireless sensor network
International Journal of Electronic Security and Digital Forensics
On the analysis and design of a family tree of smart card based user authentication schemes
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Future Generation Computer Systems
Hi-index | 0.43 |
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show that the modified scheme is still vulnerable to the attack proposed by Chan and Cheng. Moreover, the extended attack proposed by Chang and Hwang in 2003 also works well.