Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
Password authentication with insecure communication
Communications of the ACM
Communications of the ACM
Ad hoc networking: an introduction
Ad hoc networking
Securing passwords against dictionary attacks
Proceedings of the 9th ACM conference on Computer and communications security
Threshold Password-Authenticated Key Exchange
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
A secure and efficient strong-password authentication protocol
ACM SIGOPS Operating Systems Review
A Remote Authentication Scheme Preserving User Anonymity
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Provably secure threshold password-authenticated key exchange
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A simple remote user authentication scheme
Mathematical and Computer Modelling: An International Journal
New directions in cryptography
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Cryptanalysis of a remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A modified remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Cryptanalysis of a modified remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A remote user authentication scheme using smart cards with forward secrecy
IEEE Transactions on Consumer Electronics
A dynamic ID-based remote user authentication scheme
IEEE Transactions on Consumer Electronics
Tutorial: Efficient and secure password-based authentication protocols against guessing attacks
Computer Communications
Protecting poorly chosen secrets from guessing attacks
IEEE Journal on Selected Areas in Communications
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
A novel user-participating authentication scheme
Journal of Systems and Software
Information Sciences: an International Journal
Hi-index | 0.00 |
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc network, however, has called for new requirements for designing authentication schemes due to its dynamic nature and vulnerable-to-attack structure, which the traditional schemes overlooked, such as availability and strong security against off line guessing attacks in face of node compromise. In this paper, we propose a threshold password authentication scheme, which meets both availability and strong security requirements in the mobile Ad hoc networks. In our scheme, t out of n server nodes can jointly achieve mutual authentication with a registered user within only two rounds of message exchanges. Our scheme allows users to choose and change their memorable password without subjecting to guessing attacks. Moreover, there is no password table in the server nodes end, which is preferable since mobile nodes are usually memory-restricted devices. We also show that our scheme is efficient to be implemented in mobile devices.