Cryptanalysis of a flexible remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review
An improved bilinear pairing based remote user authentication scheme
Computer Standards & Interfaces
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
New Remote Mutual Authentication Scheme using Smart Cards
Transactions on Data Privacy
Two robust remote user authentication protocols using smart cards
Journal of Systems and Software
Password based remote authentication scheme using ECC for smart card
Proceedings of the 2011 International Conference on Communication, Computing & Security
Remote authentication with forward security
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
A novel remote user authentication scheme using interacting neural network
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part I
An improved anonymous authentication and key exchange scheme
Proceedings of the CUBE International Information Technology Conference
On the analysis and design of a family tree of smart card based user authentication schemes
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Novel remote user authentication scheme using bilinear pairings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
An enhanced anonymous authentication and key exchange scheme using smartcard
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks
Wireless Personal Communications: An International Journal
Hi-index | 0.43 |
In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. Chan and Chang showed that the masquerade attack is successful on this scheme. Recently Shen, Lin and Hwang pointed out a different type of attack on this scheme and presented a modified scheme to remove these defects. In this paper we present a new scheme which also overcomes these attacks. In this scheme previously generated passwords are secure even if the secret key of the system is leaked or is stolen.