Password authentication with insecure communication
Communications of the ACM
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
A more efficient and secure dynamic ID-based remote user authentication scheme
Computer Communications
More secure remote user authentication scheme
Computer Communications
A robust remote user authentication scheme against smart card security breach
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Hi-index | 0.00 |
Remote user authentication is very important for identifying whether communicating parties are genuine and trustworthy. Using a password and a smart card between a login user and a remote server is necessary. Recently, C.T. Li et al.'s noted that smart card security breach was not considered in the password authentication scheme given by S.K. Kim et al.'s in 2009, then they proposed a remote user authentication scheme against smart card security breach, which was presented in Data and Applications Security and Privacy 2011. However, we note that Li et al.'s scheme needs a verification table in the remote server. It is well-known that a verification table should not be involved in a good password authentication scheme with smart cards. In this paper, we propose a password authentication scheme against smart card security breach and without maintaining verification tables.