Filters








1,641 Hits in 9.5 sec

Security analysis of a Novel Remote User Authentication Scheme

2019 jecet  
A novel remote user authentication scheme using smart card based on ECDLP is presented by Jena et al.  ...  Date of publication on line 28.03.2017  It is clear that authentication server and the remote user do not authenticate each other's before communicating.  The remote user's login ID is not dynamically  ...  s proposed scheme 3 . Jena et al. proposed a novel remote user authentication scheme using smart card based on ECDLP.  Test the time interval between T and T'.  ... 
doi:10.24214/jecet.c.8.3.15964 fatcat:drw5mt45mffaljqurtwlcuf66m

An Enhanced Remote User Authentication Scheme

Xiaohui Yang, Xinchun Cui, Zhenliang Cao, Ziqiang Hu
2014 Engineering  
Remote user authentication schemes are used to verify the legitimacy of remote users' login request. Recently, several dynamic user authentication schemes have been proposed.  ...  In this paper, we propose a new dynamic user authentication based on nonce.  ...  Thus, the attacker might incept and analyze the login message. It is infeasible to derive the user identity ID i through h(ID i ). Furthermore, the login message is dynamic in each login.  ... 
doi:10.4236/eng.2014.66030 fatcat:tcnlquxi3rcwjeismjk3vqqfru

An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments

Shudong Li, Xiaobo Wu, Dawei Zhao, Aiping Li, Zhihong Tian, Xiaodong Yang, Hua Wang
2018 PLoS ONE  
Later, Sood et al. presented a novel dynamic identity-based authentication An efficient dynamic ID-based remote user authentication scheme PLOS ONE | https://doi.A simple XOR operation in G 1 .  ...  Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication scheme for multi-server environments.  ...  The proposed scheme In this section, we propose a novel dynamic ID-based and non-RC-dependent remote user authentication scheme for multi-server environments using pairing and self-certified public keys  ... 
doi:10.1371/journal.pone.0202657 fatcat:2pywnxh26fgntl772b4uc6cgeq

A Secure Dynamic Authentication Scheme for Smart Card based Networks

Dr. S. Santhosh Baboo, K. Gokulraj
2010 International Journal of Computer Applications  
Here, we introduce a new authentication scheme based on dynamicity which is relatively a different approach to ensure and enhance the smart card based remote authentication and security.  ...  This method introduces a dynamic authentication scheme which includes number of factors, among them the password, password index, and date of modification are important factors which decides the dynamicity  ...  [15] analyzed two improved password authentication schemes using smart cards in 2006. [16] proposed a novel remote user authentication scheme using bilinear pairings in 2006.  ... 
doi:10.5120/1605-2157 fatcat:yfm5dy6ivzfwxgqtvlvzz5mz2e

Secure Authenticated Key Exchange Protocol for Credential Services
English

R. Balakrishna, U. Rajeswara Rao, N. Geethanjali
2009 DESIDOC Journal of Library & Information Technology  
Remote user authentication and key agreement system through smartcard is a viable practical solution to validate the eligibility of a remote user and thus to provide a secure communication.  ...  In addition, the proposed scheme offers mutual authentication between the server and the user by a nonce-based plan and is free from timesynchronisation problem.  ...  Therefore, employing a dynamic-ID for each login can avoid the risk of ID-theft. A typical remote authentication scheme consists of a user and a server.  ... 
doi:10.14429/djlit.29.252 fatcat:6a7lir37lvgjdcyb4h5nsbhwky

Cryptanalysis of a Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment

Te-Yu Chen, Min-Shiang Hwang, Cheng-Chi Lee, Jinn-Ke Jan
2009 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)  
Recently, Liao and Wang proposed a dynamic ID-based remote user authentication scheme for multi-server environments. However, some flaws have been identified in their scheme.  ...  The conventional user authentication scheme is designed for a single-sever environment.  ...  Recently, Liao and Wang [12] proposed a dynamic ID based remote user authentication scheme for a multi-server environment.  ... 
doi:10.1109/icicic.2009.152 fatcat:frp6ztmaqbd2ropvztlr36273a

An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment [article]

Dawei Zhao, Haipeng Peng, Shudong Li, Yixian Yang
2013 arXiv   pre-print
s multi-server authentication scheme and proposed a novel smart card and dynamic ID based remote user authentication scheme for multi-server environments.  ...  s multi-server authentication scheme which is based on pairing and self-certified public keys, and propose a novel dynamic ID based remote user authentication scheme for multi-server environments.  ...  , we propose a novel dynamic ID based remote user authentication scheme for multi-server environment using pairing and self-certified public keys.  ... 
arXiv:1305.6350v1 fatcat:mrchtkxbrrc43k5wpkgjzzy6aq

An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks

S. Santhosh Baboo, K. Gokulraj
2012 International Journal of Computer Network and Information Security  
We introduced a new scheme to enhance and ensure the remote authentication through secure and dynamic authentication using a smart card, which is relatively a different approach.  ...  This article introduces a dynamic authentication scheme, which includes a number of factors, among them the password, password index, and date of modification are important factors, which decide the dynamicity  ...  A novel remote user authentication scheme using bilinear pairings was suggested by [17] in 2006.  ... 
doi:10.5815/ijcnis.2012.04.04 fatcat:7cy7mdkqlzgn7ccpypdlypppcu

Immune Distinctive Authentication for E-transaction through Remote Systems

Sudeep. V, Pradeep Freddy. A, Avinash Choudhary. A.R
2015 International Journal of Computer Applications  
In this paper we actualize a novel validation plan Immune Distinctive Authentication for E-Transactions Through Remote Systems (IDAERS) -Identity Based Elliptic Curve Encryption method which encourages  ...  Thus users need to oversee various online records. Thusly users key-in numerous login data to verify/access them.  ...  The remote device then decrypts the credentials and passes them for user authentication. The figure given below describes the remote login process.  ... 
doi:10.5120/19377-1034 fatcat:xokcojfde5elloxoeifjscab3y

An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme

Juan Qu, Li-min Zou
2013 Journal of Electrical and Computer Engineering  
In recent years, several dynamic ID-based remote user authentication schemes have been proposed. In 2012, Wen and Li proposed a dynamic ID-based remote user authentication with key agreement scheme.  ...  In this paper, we propose a novel ECC-based remote user authentication scheme which is immune to various known types of attack and is more secure and practical for mobile clients.  ...  Furthermore, a secure dynamic-ID remote user authentication scheme has been proposed in this paper using ECC.  ... 
doi:10.1155/2013/786587 fatcat:sbl4jaybu5hmdg2bbl5fy2qmue

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar
2011 Computer Communications  
Recently, Wang et al. proposed a dynamic ID-based remote user authentication scheme using smart cards.  ...  Remote user authentication is a method, in which remote server verifies the legitimacy of a user over an insecure communication channel.  ...  [16] proposed a dynamic IDbased remote user authentication scheme. Their scheme is novel, because dynamic identity for each transaction session can avoid the risk of id-theft or impersonation.  ... 
doi:10.1016/j.comcom.2010.02.011 fatcat:n7zrtw7z7vbhbf5hsnprgj5trm

An novel anonymous user WSN authentication for Internet of Things

Xin Zhang, Fengtong Wen
2018 Soft Computing - A Fusion of Foundations, Methodologies and Applications  
Through some thorough security analyses, we have proven that our new schemes can resist a collection of attacks including the replay attack, privileged insider attack, stolen verifier attack, stolen smart  ...  Our first new model is to be applied in most common network environments where users directly connect to the authentication server, whereas the second new model is most applicable when users connect to  ...  [19] proposed a dynamic user authentication scheme for WSN. As a lightweight authentication scheme, their work uses only the hash function. In 2007, Tseng et al.  ... 
doi:10.1007/s00500-018-3226-6 fatcat:egxmejmbmnhuve7isoz7ikrjfa

A bilateral remote user authentication scheme that preserves user anonymity

Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
2008 Security and Communication Networks  
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication.  ...  These crucial merits include (1) a user can freely choose and change his passwords; (2) our scheme provides mutual authentication between a server and a user; (3) it achieves user anonymity; (4) a server  ...  [5] first proposed a dynamic identity-based authentication scheme that preserves user anonymity. However, Chien and Chen [2] pointed out that Das et al.'  ... 
doi:10.1002/sec.26 fatcat:n4aiti6gr5dfnczc3dmw55v5ji

An Enhanced User Authentication Framework in Cloud Computing

Hasan Al Refai, Khaldoun Batiha, Ahmad M Al-Refai
2020 International journal of network security and its applications  
The proposed framework provides many security aspects such as remote authentication, mutual authentication, session key establishment,to mention a few.  ...  In this work, we aim to propose a robust user authentication framework that overcomes the previous framework shortages.  ...  So, they built a secure and robust framework by using a remote user authentication scheme. Hasan, M. et al.  ... 
doi:10.5121/ijnsa.2020.12204 fatcat:2n3vuzmaazawra33r7r2gtpbcq

Design of a Secure Dynamic Identity Authentication Scheme for Health Internet of Things

Chengqi Wang, Xiao Zhang, Lijia Xie, Zhiming Zheng
2017 International Journal of Security and Its Applications  
As a remedy, we propose a novel dynamic identity authenticated key agreement scheme. Our scheme achieves resistance to the known attacks in order to meet the desirable security requirements.  ...  To address these issues, we propose a three-factor identity-based authenticated key agreement scheme, which is built upon extended chaotic maps. Our scheme improves Wang et al.'  ...  In our proposal, user Ui calculate his dynamic identity i AID as   i i i AID ID h Z  .  ... 
doi:10.14257/ijsia.2017.11.9.04 fatcat:7wt72mnngjgarddykifwn4fxt4
« Previous Showing results 1 — 15 out of 1,641 results