A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security analysis of a Novel Remote User Authentication Scheme
2019
jecet
A novel remote user authentication scheme using smart card based on ECDLP is presented by Jena et al. ...
Date of publication on line 28.03.2017 It is clear that authentication server and the remote user do not authenticate each other's before communicating. The remote user's login ID is not dynamically ...
s proposed scheme 3 . Jena et al. proposed a novel remote user authentication scheme using smart card based on ECDLP.
Test the time interval between T and T'. ...
doi:10.24214/jecet.c.8.3.15964
fatcat:drw5mt45mffaljqurtwlcuf66m
An Enhanced Remote User Authentication Scheme
2014
Engineering
Remote user authentication schemes are used to verify the legitimacy of remote users' login request. Recently, several dynamic user authentication schemes have been proposed. ...
In this paper, we propose a new dynamic user authentication based on nonce. ...
Thus, the attacker might incept and analyze the login message. It is infeasible to derive the user identity ID i through h(ID i ). Furthermore, the login message is dynamic in each login. ...
doi:10.4236/eng.2014.66030
fatcat:tcnlquxi3rcwjeismjk3vqqfru
An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments
2018
PLoS ONE
Later, Sood et al. presented a novel dynamic identity-based authentication An efficient dynamic ID-based remote user authentication scheme PLOS ONE | https://doi.A simple XOR operation in G 1 . ...
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication scheme for multi-server environments. ...
The proposed scheme In this section, we propose a novel dynamic ID-based and non-RC-dependent remote user authentication scheme for multi-server environments using pairing and self-certified public keys ...
doi:10.1371/journal.pone.0202657
fatcat:2pywnxh26fgntl772b4uc6cgeq
A Secure Dynamic Authentication Scheme for Smart Card based Networks
2010
International Journal of Computer Applications
Here, we introduce a new authentication scheme based on dynamicity which is relatively a different approach to ensure and enhance the smart card based remote authentication and security. ...
This method introduces a dynamic authentication scheme which includes number of factors, among them the password, password index, and date of modification are important factors which decides the dynamicity ...
[15] analyzed two improved password authentication schemes using smart cards in 2006. [16] proposed a novel remote user authentication scheme using bilinear pairings in 2006. ...
doi:10.5120/1605-2157
fatcat:yfm5dy6ivzfwxgqtvlvzz5mz2e
Secure Authenticated Key Exchange Protocol for Credential Services
English
2009
DESIDOC Journal of Library & Information Technology
English
Remote user authentication and key agreement system through smartcard is a viable practical solution to validate the eligibility of a remote user and thus to provide a secure communication. ...
In addition, the proposed scheme offers mutual authentication between the server and the user by a nonce-based plan and is free from timesynchronisation problem. ...
Therefore, employing a dynamic-ID for each login can avoid the risk of ID-theft. A typical remote authentication scheme consists of a user and a server. ...
doi:10.14429/djlit.29.252
fatcat:6a7lir37lvgjdcyb4h5nsbhwky
Cryptanalysis of a Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment
2009
2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)
Recently, Liao and Wang proposed a dynamic ID-based remote user authentication scheme for multi-server environments. However, some flaws have been identified in their scheme. ...
The conventional user authentication scheme is designed for a single-sever environment. ...
Recently, Liao and Wang [12] proposed a dynamic ID based remote user authentication scheme for a multi-server environment. ...
doi:10.1109/icicic.2009.152
fatcat:frp6ztmaqbd2ropvztlr36273a
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
[article]
2013
arXiv
pre-print
s multi-server authentication scheme and proposed a novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. ...
s multi-server authentication scheme which is based on pairing and self-certified public keys, and propose a novel dynamic ID based remote user authentication scheme for multi-server environments. ...
, we propose a novel dynamic ID based remote user authentication scheme for multi-server environment using pairing and self-certified public keys. ...
arXiv:1305.6350v1
fatcat:mrchtkxbrrc43k5wpkgjzzy6aq
An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks
2012
International Journal of Computer Network and Information Security
We introduced a new scheme to enhance and ensure the remote authentication through secure and dynamic authentication using a smart card, which is relatively a different approach. ...
This article introduces a dynamic authentication scheme, which includes a number of factors, among them the password, password index, and date of modification are important factors, which decide the dynamicity ...
A novel remote user authentication scheme using bilinear pairings was suggested by [17] in 2006. ...
doi:10.5815/ijcnis.2012.04.04
fatcat:7cy7mdkqlzgn7ccpypdlypppcu
Immune Distinctive Authentication for E-transaction through Remote Systems
2015
International Journal of Computer Applications
In this paper we actualize a novel validation plan Immune Distinctive Authentication for E-Transactions Through Remote Systems (IDAERS) -Identity Based Elliptic Curve Encryption method which encourages ...
Thus users need to oversee various online records. Thusly users key-in numerous login data to verify/access them. ...
The remote device then decrypts the credentials and passes them for user authentication. The figure given below describes the remote login process. ...
doi:10.5120/19377-1034
fatcat:xokcojfde5elloxoeifjscab3y
An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme
2013
Journal of Electrical and Computer Engineering
In recent years, several dynamic ID-based remote user authentication schemes have been proposed. In 2012, Wen and Li proposed a dynamic ID-based remote user authentication with key agreement scheme. ...
In this paper, we propose a novel ECC-based remote user authentication scheme which is immune to various known types of attack and is more secure and practical for mobile clients. ...
Furthermore, a secure dynamic-ID remote user authentication scheme has been proposed in this paper using ECC. ...
doi:10.1155/2013/786587
fatcat:sbl4jaybu5hmdg2bbl5fy2qmue
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
2011
Computer Communications
Recently, Wang et al. proposed a dynamic ID-based remote user authentication scheme using smart cards. ...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user over an insecure communication channel. ...
[16] proposed a dynamic IDbased remote user authentication scheme. Their scheme is novel, because dynamic identity for each transaction session can avoid the risk of id-theft or impersonation. ...
doi:10.1016/j.comcom.2010.02.011
fatcat:n7zrtw7z7vbhbf5hsnprgj5trm
An novel anonymous user WSN authentication for Internet of Things
2018
Soft Computing - A Fusion of Foundations, Methodologies and Applications
Through some thorough security analyses, we have proven that our new schemes can resist a collection of attacks including the replay attack, privileged insider attack, stolen verifier attack, stolen smart ...
Our first new model is to be applied in most common network environments where users directly connect to the authentication server, whereas the second new model is most applicable when users connect to ...
[19] proposed a dynamic user authentication scheme for WSN. As a lightweight authentication scheme, their work uses only the hash function. In 2007, Tseng et al. ...
doi:10.1007/s00500-018-3226-6
fatcat:egxmejmbmnhuve7isoz7ikrjfa
A bilateral remote user authentication scheme that preserves user anonymity
2008
Security and Communication Networks
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. ...
These crucial merits include (1) a user can freely choose and change his passwords; (2) our scheme provides mutual authentication between a server and a user; (3) it achieves user anonymity; (4) a server ...
[5] first proposed a dynamic identity-based authentication scheme that preserves user anonymity. However, Chien and Chen [2] pointed out that Das et al.' ...
doi:10.1002/sec.26
fatcat:n4aiti6gr5dfnczc3dmw55v5ji
An Enhanced User Authentication Framework in Cloud Computing
2020
International journal of network security and its applications
The proposed framework provides many security aspects such as remote authentication, mutual authentication, session key establishment,to mention a few. ...
In this work, we aim to propose a robust user authentication framework that overcomes the previous framework shortages. ...
So, they built a secure and robust framework by using a remote user authentication scheme. Hasan, M. et al. ...
doi:10.5121/ijnsa.2020.12204
fatcat:2n3vuzmaazawra33r7r2gtpbcq
Design of a Secure Dynamic Identity Authentication Scheme for Health Internet of Things
2017
International Journal of Security and Its Applications
As a remedy, we propose a novel dynamic identity authenticated key agreement scheme. Our scheme achieves resistance to the known attacks in order to meet the desirable security requirements. ...
To address these issues, we propose a three-factor identity-based authenticated key agreement scheme, which is built upon extended chaotic maps. Our scheme improves Wang et al.' ...
In our proposal, user Ui calculate his dynamic identity i
AID
as
i
i
i
AID ID h Z
. ...
doi:10.14257/ijsia.2017.11.9.04
fatcat:7wt72mnngjgarddykifwn4fxt4
« Previous
Showing results 1 — 15 out of 1,641 results