Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
ACM Transactions on Computer Systems (TOCS)
Password authentication with insecure communication
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme
NWESP '05 Proceedings of the International Conference on Next Generation Web Services Practices
Improving the security of 'a flexible biometrics remote user authentication scheme'
Computer Standards & Interfaces
Indentity-based broadcast signcryption
Computer Standards & Interfaces
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
An efficient biometrics-based remote user authentication scheme using smart cards
Journal of Network and Computer Applications
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 02
Journal of Network and Computer Applications
New dynamic ID authentication scheme using smart cards
International Journal of Communication Systems
Security of two-party identity-based key agreement
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Improving the dynamic ID-Based remote mutual authentication scheme
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Mobile device integration of a fingerprint biometric remote authentication scheme
International Journal of Communication Systems
A simple remote user authentication scheme
Mathematical and Computer Modelling: An International Journal
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
A modified remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A dynamic ID-based remote user authentication scheme
IEEE Transactions on Consumer Electronics
A remote password authentication scheme for multiserver architecture using neural networks
IEEE Transactions on Neural Networks
An efficient ID-based authenticated key agreement protocol with pairings
ISPA'07 Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications
Dynamic intelligence towards merging cloud and communication services
Information Systems Frontiers
Hi-index | 0.00 |
With non-stop growth in network environments, communication security is necessary. A strong protocol guarantees that users and service providers are secure against many kinds of attacks, such as impersonation and replay attack. Sood et al. proposed an authentication scheme based on dynamic identity to prevent transactions from being intercepted by malicious users. Although they claimed that their scheme has advantages over previous schemes with the same approach, we prove that their scheme is vulnerable to impersonation attack and stolen verification attack, and can be affected by clock synchronization. Therefore we propose a novel authentication scheme to enhance security and overcome limitations existing in Sood's scheme. Our security analysis shows that our proposed method can efficiently resist known types of attacks. Experimental results also show that the method can be implemented and processed in real-time thus applicable for not only regular computers but also mobile devices.