Identity authentication based on keystroke latencies
Communications of the ACM
Comments on the S/KEY user authentication scheme
ACM SIGOPS Operating Systems Review
“Paramita wisdom” password authentication scheme without verification tables
Journal of Systems and Software
Password authentication with insecure communication
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
A high security log-in procedure
Communications of the ACM
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
A simple remote user authentication scheme
Mathematical and Computer Modelling: An International Journal
New directions in cryptography
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Cryptanalysis of a remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A modified remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Research note: Cryptanalysis of a remote login authentication scheme
Computer Communications
Cryptanalysis of a password authentication scheme over insecure networks
Journal of Computer and System Sciences
Two-factor mutual authentication based on smart cards and passwords
Journal of Computer and System Sciences
Building a better password: the role of cognitive load in information security training
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
A novel user-participating authentication scheme
Journal of Systems and Software
An improvement of Xu et al.'s authentication scheme using smart cards
Proceedings of the Third Annual ACM Bangalore Conference
Token-based authenticated key establishment protocols for three-party communication
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
WSEAS Transactions on Information Science and Applications
Robust authentication and key agreement scheme preserving the privacy of secret key
Computer Communications
A robust remote user authentication scheme against smart card security breach
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Timestamp based authentication protocol for smart card using ECC
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Efficient password-based authentication and key exchange scheme preserving user privacy
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Formal analysis and systematic construction of two-factor authentication scheme (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Remote authentication with forward security
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Mobile device integration of a fingerprint biometric remote authentication scheme
International Journal of Communication Systems
A new dynamic ID-Based remote user authentication scheme with forward secrecy
APWeb'12 Proceedings of the 14th international conference on Web Technologies and Applications
Security analysis and enhancement for three-party password-based authenticated key exchange protocol
Security and Communication Networks
Robust smart-cards-based user authentication scheme with user anonymity
Security and Communication Networks
A More Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
A Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Security analysis of a multi-factor authenticated key exchange protocol
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
An Improved Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Journal of Computer and System Sciences
A password authentication scheme against smart card security breach
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
On the security of an improved password authentication scheme based on ECC
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Pools, clubs and security: designing for a party not a person
Proceedings of the 2012 workshop on New security paradigms
Security and Communication Networks
BICS'13 Proceedings of the 6th international conference on Advances in Brain Inspired Cognitive Systems
Hi-index | 0.00 |
Authentication ensures that system's resources are not obtained fraudulently by illegal users. Password authentication is one of the simplest and the most convenient authentication mechanisms over insecure networks. The problem of password authentication in an insecure networks is present in many application areas. Since computing resources have grown tremendously, password authentication is more frequently required in areas such as computer networks, wireless networks, remote login, operation systems, and database management systems. Many schemes based on cryptography have been proposed to solve the problem. However, previous schemes are vulnerable to various attacks and are neither efficient, nor user friendly. Users cannot choose and change their passwords at will. In this paper, we propose a new password authentication scheme to achieve the all proposed requirements. Furthermore, our scheme can support the Diffie-Hellman key agreement protocol over insecure networks. Users and the system can use the agreed session key to encrypt/decrypt their communicated messages using the symmetric cryptosystem.