ID-based password authentication scheme using smart cards and fingerprints
ACM SIGOPS Operating Systems Review
Two-factor mutual authentication based on smart cards and passwords
Journal of Computer and System Sciences
DoS-resistant ID-based password authentication scheme using smart cards
Journal of Systems and Software
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Journal of Network and Computer Applications
An AAA scheme using ID-based ticket with anonymity in future mobile communication
Computer Communications
Formal analysis and systematic construction of two-factor authentication scheme (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Robust smart-cards-based user authentication scheme with user anonymity
Security and Communication Networks
An enhanced biometrics-based remote user authentication scheme using mobile devices
International Journal of Computational Intelligence Studies
Hi-index | 0.00 |
In a paper recently published in the ACM Operating Systems Review, Kim, Lee and Yoo [1] describe two ID-based password authentication schemes for logging onto a remote network server using smart cards, passwords and fingerprints. Various claims are made regarding the security of the schemes, but no proof is offered. Here we show how a passive eavesdropper, without access to any smart card, password or fingerprint, and after passively eavesdropping only one legitimate log-on, can subsequently log-on to the server claiming any identity.