Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Shared authentication token secure against replay and weak key attacks
Information Processing Letters
Password authentication with insecure communication
Communications of the ACM
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
Improving the security of 'a flexible biometrics remote user authentication scheme'
Computer Standards & Interfaces
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
Research note: Remote password authentication scheme based on cross-product
Computer Communications
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Computer Standards & Interfaces
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Secure group key agreement protocol based on chaotic Hash
Information Sciences: an International Journal
Security analysis of 'two-factor user authentication in wireless sensor networks'
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Security enhancement on an improvement on two remote user authentication schemes using smart cards
Future Generation Computer Systems
Robust authentication and key agreement scheme preserving the privacy of secret key
Computer Communications
A novel and low-computation e-cash transfer system against blackmail for mobile communications
International Journal of Mobile Communications
Review: Dynamic ID-based remote user password authentication schemes using smart cards: A review
Journal of Network and Computer Applications
Mobile device integration of a fingerprint biometric remote authentication scheme
International Journal of Communication Systems
Security vulnerabilities of user authentication scheme using smart card
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
An improved anonymous authentication and key exchange scheme
Proceedings of the CUBE International Information Technology Conference
An enhanced anonymous authentication and key exchange scheme using smartcard
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Journal of Medical Systems
BICS'13 Proceedings of the 6th international conference on Advances in Brain Inspired Cognitive Systems
An enhanced remote user authentication scheme using smart card
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography
Computer Standards & Interfaces
An improved dynamic ID-based remote user authentication with key agreement scheme
Journal of Electrical and Computer Engineering
Hi-index | 0.00 |
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards, in which only few hashing operations are required. Later, Ku et al. gave an improved scheme to repair the security pitfalls found in Chien et al.'s scheme. Also Yoon et al. presented an enhancement on Ku et al.'s scheme. In this paper, we show that both Ku et al.'s scheme and Yoon et al.'s scheme are still vulnerable to the guessing attack, forgery attack and denial of service (DoS) attack. In addition, their schemes lack efficiency when users input wrong passwords. To remedy these flaws, this paper proposes an efficient improvement over Ku et al.'s and Yoon et al.'s schemes with more security. The computation cost, security, and efficiency of the improved scheme are embarking for the real application in the resource-limited environment.