A remote user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review
A new method for using hash functions to solve remote user authentication
Computers and Electrical Engineering
Secure hash-based password authentication protocol using smartcards
ICCSA'11 Proceedings of the 2011 international conference on Computational science and Its applications - Volume Part V
Hi-index | 0.00 |
Recently, Lee et al. proposed an improvement on Peyravian and Zunic scheme to make the protocol withstand the guessing attack. However, their scheme suffers from a denial of service attack. In this paper, we show that an attacker can easily prevent the normal use of communication facilities by performing the attack. We also propose an enhancement of the scheme to isolate such a problem.