A remote password authentication scheme based upon ElGamal's signature scheme
Computers and Security
A remote user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Research note: Cryptanalysis of a remote login authentication scheme
Computer Communications
Hi-index | 0.00 |
Recently, Lee et al. proposed an improved scheme, called LLH scheme, to solve a security problem of guessing attack in the Peyravian-Zunic password scheme. The scheme comprises a password authentication protocol and a password change protocol. However, we discuss that the LLH scheme has several security problems: the scheme is still vulnerable to the guessing attack; the scheme cannot also prevent the stolen-verifier attack; the password change protocol in scheme is vulnerable to a denial of service attack.