Improving the security of 'a flexible biometrics remote user authentication scheme'
Computer Standards & Interfaces
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Cryptanalysis and improvement on remote user mutual authentication scheme with smart cards
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
New Remote Mutual Authentication Scheme using Smart Cards
Transactions on Data Privacy
Advanced smart card based password authentication protocol
Computer Standards & Interfaces
Authentication assurance level taxonomies for smart identity token deployments: a new approach
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Password based remote authentication scheme using ECC for smart card
Proceedings of the 2011 International Conference on Communication, Computing & Security
An efficient and practical fingerprint-based remote user authentication scheme with smart cards
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Efficient user authentication and key agreement in ubiquitous computing
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
An improved anonymous authentication and key exchange scheme
Proceedings of the CUBE International Information Technology Conference
An enhanced anonymous authentication and key exchange scheme using smartcard
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Hi-index | 0.43 |
In 1981, Lamport introduced a remote password authentication scheme using a password table. In 2000, Hwang and Li proposed a remote user authentication scheme using smart cards to solve the problems of Lamport scheme. First, Chan-Chang, Shen-Lin-Hwang and then Chang-Hwang pointed out some attacks on Hwang-Li's scheme. Shen-Lin-Hwang also proposed a modified scheme. In 2003, Leung-Cheng-Fong-Chan showed that a modified scheme proposed by Shen-Lin-Hwang is still vulnerable to all previous attacks. This paper presents a new remote user authentication scheme. This scheme is secure against Chan-Cheng and all the extended attacks.