Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
A remote password authentication scheme based upon ElGamal's signature scheme
Computers and Security
“Paramita wisdom” password authentication scheme without verification tables
Journal of Systems and Software
Password authentication with insecure communication
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
Cryptography and data security
Cryptography and data security
Smart Card Handbook
Using IC Cards to Remotely Login Passwords without Verification Tables
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
An efficient and complete remote user authentication scheme using smart cards
Mathematical and Computer Modelling: An International Journal
New directions in cryptography
IEEE Transactions on Information Theory
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Convertible multi-authenticated encryption scheme with one-way hash function
Computer Communications
Hi-index | 0.00 |
Wang et al. presented a remote password authentication scheme using IC (Integrated Circuit) cards in 2004. Unfortunately, we discovered that their scheme is unable to withstand the forgery attack. We consequently propose in this paper a novel version to resist this kind of attacks. Furthermore, our scheme can also provide mutual authentication between a remote server and login users. The security of our scheme is based on the public one-way hash function. What is more, the timestamp mechanism is applied in our scheme to protect such potential attacks in the case that an intruder may replay a previously intercepted login request to access the remote server.