A remote user authentication scheme preserving user anonymity and traceability
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
WSEAS Transactions on Information Science and Applications
Two robust remote user authentication protocols using smart cards
Journal of Systems and Software
A secure dynamic identity based authentication protocol for multi-server architecture
Journal of Network and Computer Applications
Weaknesses of a dynamic ID-based remote user authentication scheme
International Journal of Electronic Security and Digital Forensics
A novel and low-computation e-cash transfer system against blackmail for mobile communications
International Journal of Mobile Communications
Improving the dynamic ID-Based remote mutual authentication scheme
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
An improved dynamic ID-based remote user authentication with key agreement scheme
Computers and Electrical Engineering
Review: Dynamic ID-based remote user password authentication schemes using smart cards: A review
Journal of Network and Computer Applications
Security vulnerabilities of user authentication scheme using smart card
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Journal of Medical Systems
Encrypted remote user authentication scheme by using smart card
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme
International Journal of Communication Systems
Advanced remote user authentication protocol for multi-server architecture based on ECC
Journal of Information Security and Applications
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 0.00 |
In a paper recently published in the IEEE Transaction on Consumer Electronics, Das, Saxena, and Gulati proposed a dynamic ID-based remote user authentication scheme using smart cards that allows the users to choose and change their passwords freely, and does not maintain any verifier table. It can protect against ID-theft, replaying, forgery, guessing, insider, and stolen verifier attacks. However, this paper shows that Das, Saxena, and Gulati's scheme has some attacks. Therefore, we propose a slight modification to their scheme to improve their weaknesses. As a result, the improved scheme can enhance the security of Das, Saxena, and Gulati's scheme. In addition, the proposed scheme does not add many computational costs additionally. Compare with their scheme, our scheme is also efficient.