Cryptanalysis of a flexible remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
A more efficient and secure dynamic ID-based remote user authentication scheme
Computer Communications
Computer Standards & Interfaces
Computer Standards & Interfaces
Cryptanalysis of a remote user authentication scheme using smart cards
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A remote user authentication scheme preserving user anonymity and traceability
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An improvement of Hsiang-Shih's authentication scheme using smart cards
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
New Remote Mutual Authentication Scheme using Smart Cards
Transactions on Data Privacy
Efficient user authentication and key agreement in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A simple and efficient key exchange scheme against the smart card loss problem
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
WSEAS Transactions on Information Science and Applications
Security analysis of 'two-factor user authentication in wireless sensor networks'
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Security enhancement on an improvement on two remote user authentication schemes using smart cards
Future Generation Computer Systems
Password based remote authentication scheme using ECC for smart card
Proceedings of the 2011 International Conference on Communication, Computing & Security
A novel and low-computation e-cash transfer system against blackmail for mobile communications
International Journal of Mobile Communications
Improvement of Li-Hwang's biometrics-based remote user authentication scheme using smart cards
WSEAS TRANSACTIONS on COMMUNICATIONS
Efficient remote user authentication scheme using smart cards
International Journal of Internet Technology and Secured Transactions
Secure dynamic identity-based remote user authentication scheme
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
Robust secret key based authentication scheme using smart cards
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
One-time password authentication scheme using smart cards providing user anonymity
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Efficient user authentication and key agreement in ubiquitous computing
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Authentication based on singular cellular automata
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
Efficient remote user authentication and key establishment for multi-server environment
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
A simple and efficient conference scheme for mobile communications
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Cryptanalysis and improvement of sood et al.'s dynamic ID-Based authentication scheme
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Review: Dynamic ID-based remote user password authentication schemes using smart cards: A review
Journal of Network and Computer Applications
Mobile device integration of a fingerprint biometric remote authentication scheme
International Journal of Communication Systems
A new dynamic ID-Based remote user authentication scheme with forward secrecy
APWeb'12 Proceedings of the 14th international conference on Web Technologies and Applications
Efficient password authenticated key agreement using bilinear pairings
Mathematical and Computer Modelling: An International Journal
Security analysis and enhancement for three-party password-based authenticated key exchange protocol
Security and Communication Networks
Security vulnerabilities of user authentication scheme using smart card
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
An improved anonymous authentication and key exchange scheme
Proceedings of the CUBE International Information Technology Conference
Future Generation Computer Systems
Security analysis of a secure and practical dynamic identity-based remote user authentication scheme
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
Goals and Practices in Maintaining Information Systems Security
International Journal of Information Security and Privacy
An enhanced anonymous authentication and key exchange scheme using smartcard
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication
Wireless Personal Communications: An International Journal
BICS'13 Proceedings of the 6th international conference on Advances in Brain Inspired Cognitive Systems
An enhanced remote user authentication scheme using smart card
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.43 |
Recently, Chien et al. proposed an efficient remote authentication scheme using smart cards. However, we find that their scheme is vulnerable to a reflection attack and an insider attack. In addition, their scheme lacks reparability. Herein, we first show the weaknesses of Chien et al.'s scheme, and then propose an improved scheme with better security strength.