A remote password authentication scheme based upon ElGamal's signature scheme
Computers and Security
Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
Public-key cryptography and password protocols
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
“Paramita wisdom” password authentication scheme without verification tables
Journal of Systems and Software
Password security: a case history
Communications of the ACM
An ElGamal-Like Cryptosystem for Enciphering Large Messages
IEEE Transactions on Knowledge and Data Engineering
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Research note: Cryptanalysis of a remote login authentication scheme
Computer Communications
A remote password authentication scheme for multiserver architecture using neural networks
IEEE Transactions on Neural Networks
Security enhancement for Optimal Strong-Password Authentication protocol
ACM SIGOPS Operating Systems Review
Security enhancement for optimal strong-password authentication protocol
ACM SIGOPS Operating Systems Review
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review
Cryptanalysis of a user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
A secure user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
A simple password authentication using a polynomial
ACM SIGOPS Operating Systems Review
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review
A new method for using hash functions to solve remote user authentication
Computers and Electrical Engineering
An electronic voting protocol with deniable authentication for mobile ad hoc networks
Computer Communications
An improved bilinear pairing based remote user authentication scheme
Computer Standards & Interfaces
A more efficient and secure dynamic ID-based remote user authentication scheme
Computer Communications
New Remote Mutual Authentication Scheme using Smart Cards
Transactions on Data Privacy
Two robust remote user authentication protocols using smart cards
Journal of Systems and Software
Secure hash-based password authentication protocol using smartcards
ICCSA'11 Proceedings of the 2011 international conference on Computational science and Its applications - Volume Part V
Efficient remote user authentication scheme using smart cards
International Journal of Internet Technology and Secured Transactions
A novel remote user authentication scheme using interacting neural network
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part I
Efficient password authenticated key agreement using bilinear pairings
Mathematical and Computer Modelling: An International Journal
Novel remote user authentication scheme using bilinear pairings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
Recently, Peyravian and Zunic proposed a simple but efficient password authentication system. Their scheme is based on the collision-resistant hash function, such as SHA-1. Their scheme did not use any cryptosystems (such as DES, RSA, etc.). However, their scheme is vulnerable to guess attack. An attacker can easily obtain a user's password by guessing attack and then impersonate the user to login and access resources in the server. To overcome the vulnerability of their scheme, we propose an improved scheme to enhance security of their scheme in this article.