More secure remote user authentication scheme
Computer Communications
A remote user authentication scheme preserving user anonymity and traceability
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Robust one-time password authentication scheme using smart card for home network environment
Computer Communications
Location-based authentication protocol for first cognitive radio networking standard
Journal of Network and Computer Applications
AUTHHOTP- HOTP based authentication scheme over home network environment
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part III
Efficient remote user authentication scheme using smart cards
International Journal of Internet Technology and Secured Transactions
Security enhancement of a remote user authentication scheme using smart cards
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Review: Dynamic ID-based remote user password authentication schemes using smart cards: A review
Journal of Network and Computer Applications
Hi-index | 0.43 |
In 2000, since Hwang and Li proposed a remote user authentication scheme without password table using smart cards based on ID-based cryptosystems, the related works have been done. In 2002, Chien et al. proposed an efficient and practical remote user authentication scheme providing the many merits. However, Hsu showed that Chien et al.'s scheme is vulnerable to the parallel session attack. This paper proposes an improved scheme to overcome the weakness while maintaining the advantages of Chien et al.'s scheme.