Filters








5,259 Hits in 7.0 sec

Cryptanalysis of a flexible remote user authentication scheme using smart cards

Wei-Chi Ku, Shuai-Min Chen
2005 ACM SIGOPS Operating Systems Review  
In 2002, Lee, Hwang, and Yang proposed a verifier-free remote user authentication scheme using smart cards. Their scheme is efficient because of mainly using cryptographic hash functions.  ...  Furthermore, it lacks the user eviction mechanism. In this paper, we first show the weaknesses of Lee-Hwang-Yang's scheme, and then compare Lee-Hwang-Yang's scheme with three similar schemes.  ...  V Conclusion Herein, we have shown that a flexible remote user authentication scheme proposed by Lee, Hwang, and Yang is not reparable once the user's permanent secret is compromised and is vulnerable  ... 
doi:10.1145/1044552.1044562 fatcat:5w272e3jjbcmzam6yxb7enfyoe

On the Security of "an efficient and complete remote user authentication scheme" [article]

Manik Lal Das
2008 arXiv   pre-print
Recently, Liaw et al. proposed a remote user authentication scheme using smart cards.  ...  Their scheme has claimed a number of features e.g. mutual authentication, no clock synchronization, no verifier table, flexible user password change, etc. We show that Liaw et al.'  ...  [2] proposed a remote user authentication scheme using smart cards.  ... 
arXiv:0802.2112v1 fatcat:rwycyyvnendobiu46va24fwale

Mitigating Vulnerabilities in 3-Factor based Authentication

Yogita Borse, Irfan Siddavatam
2013 International Journal of Computer Applications  
Remote user authentication schemes are use to identify a user in the distributed environment.  ...  There are three different factors commonly use for authentication purpose named as password, smart card and biometric.  ...  IMPROVED 3-FACTORS BASED REMOTE USER AUTHENTICATION SCHEME This section include an improvement of the Lin-Lai's a flexible biometrics remote user authentication scheme using smart cards in order to withstand  ... 
doi:10.5120/13283-0678 fatcat:bkfspgna6jhshbrdpj4pcpvbdq

A novel remote user authentication scheme using bilinear pairings

Manik Lal Das, Ashutosh Saxena, Ved P. Gulati, Deepak B. Phatak
2006 Computers & security  
The paper presents a remote user authentication scheme using the properties of bilinear pairings.  ...  The scheme prohibits the scenario of many logged in users with the same login-ID, and provides a flexible password change option to the registered users without any assistance from the remote system.  ...  In this paper, we present a remote user authentication scheme using the properties of bilinear pairings.  ... 
doi:10.1016/j.cose.2005.09.002 fatcat:asdoit5onrf23jokbz73czcpvq

Application of Automatic Variable Password Technique in Das's Remote System Authentication Scheme Using Smart Card

C. Koner, C. T. Bhunia, U. Maulik
2010 Journal of clean energy technologies  
Recently Das proposed a flexible remote systems authentication scheme using smart card [8] that checks authenticity of user as well as remote system.  ...  Application of AVP made the Das's scheme a Time Variant Authentication scheme that checks the authenticity of remote user time to time.  ...  In 2006, Das et al [8] developed a flexible remote user authentication scheme using smart card that authenticates user as well as remote system.  ... 
doi:10.7763/ijcte.2010.v2.106 fatcat:pxdgajhnezfzbmqskvanc57zjq

Dynamic Encryption Key based Smart Card Authentication Scheme

Ravi SinghPippal, Pradeep Gupta, Rakesh Singh
2013 International Journal of Computer Applications  
This paper describes a new smart card authentication scheme using symmetric key cryptography, which covers all the identified security pitfalls and satisfies the needs of a user.  ...  In order to keep away from difficulties associated with traditional password based authentication methods, smart card based authentication schemes have been widely used.  ...  Recently, a biometrics based remote user authentication scheme using smart cards has been proposed [17] .  ... 
doi:10.5120/12521-8481 fatcat:2sglof5puzfprbkdypmq5vaige

Password authentication schemes with smart cards

Wen-Her Yang, Shiuh-Pyng Shieh
1999 Computers & security  
In this paper, two password authentication schemes with smart cards are proposed.  ...  In the schemes, users can change their passwords freely, and the remote system does not need the directory of passwords or verification tables to authenticate users.  ...  , and the session nonce N that the smart card used to evaluate Yi is identical to the one the remote host generated.  ... 
doi:10.1016/s0167-4048(99)80136-9 fatcat:pefv64kvn5ckxgcnwb7t7ox3ye

Cryptanalysis of Goriparthi et al.'s Bilinear Pairing Based Remote User Authentication Scheme [chapter]

Hae-Jung Kim, Eun-Jun Yoon
2012 Lecture Notes in Computer Science  
In 2009, Goriparthi et al. proposed an improved bilinear pairing based remote user authentication scheme.  ...  Recently, many user authentication schemes with bilinear pairings have been proposed for client-server environment.  ...  Introduction A remote user authentication scheme allows users to access various services offered by the remote server.  ... 
doi:10.1007/978-3-642-35606-3_69 fatcat:lhw5ikeorjc4ni47cmmmwyod24

Three Attacks On Jia Et Al.'S Remote User Authentication Scheme Using Bilinear Pairings And Ecc

Eun-Jun Yoon, Kee-Young Yoo
2011 Zenodo  
Recently, Jia et al. proposed a remote user authentication scheme using bilinear pairings and an Elliptic Curve Cryptosystem (ECC).  ...  In addition, the scheme can be vulnerable to server spoofing attack because it does not provide mutual authentication between the user and the remote server.  ...  [4] proposed a remote password authentication scheme with smart cards.  ... 
doi:10.5281/zenodo.1335052 fatcat:qjr2bdmzobedbpbqty2y3vuvcu

Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards

Ashok Kumar Das
2011 International journal of network security and its applications  
Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang's efficient biometric-based remote user authentication  ...  scheme using smart cards.  ...  In 2004, Lin and Lai proposed a flexible biometric-based remote user authentication scheme [8] .  ... 
doi:10.5121/ijnsa.2011.3202 fatcat:x7p6r6mjjfedppqunwvjuums3i

Secure Remote User Authentication Scheme Using Bilinear Pairings [chapter]

Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo
2007 Lecture Notes in Computer Science  
In 2006, Das et al. proposed a remote user authentication scheme using the properties of bilinear pairings. The current paper, however, demonstrates that Das et al.'  ...  Furthermore, we present an improved authentication scheme based on bilinear computational Diffie-Hellman problem and one-way hash function to the schemes, in order to isolate such problems.  ...  [8] proposed a remote user authentication scheme using the properties of bilinear pairings that can prohibit the scenario of many logged in users with the same login-ID, and provide a flexible password  ... 
doi:10.1007/978-3-540-72354-7_9 fatcat:yqvy5up57ng6lmuv36b5ml45ou

A Robust Three-Factor User Authentication Scheme based on Elliptic Curve Cryptography and Fuzzy Extractor
타원곡선 암호화와 퍼지 추출자를 이용한 강건한 삼중요소 사용자 인증 방식 연구

Trung Thanh Ngo, Tae-Young Choe
2019 Journal of KIISE  
We propose a robust three-factor authentication scheme entailing server smart cards, elliptic curve cryptography, and a fuzzy extractor that address the foregoing flaws and result in enhanced security.  ...  A three-factor user authentication is appropriate to ensure a high degree of authentication.  ...  Lai, "A flexible biometrics remote user authentication scheme," Computer Standards & Interfaces, Vol. 27, No. 1, pp. 19-23, 2004.  ... 
doi:10.5626/jok.2019.46.6.587 fatcat:wluqwcega5gohcpojbol3ofyti

A 3-D Geometry based Remote Login 2-Way Authentication Scheme using Smart Card

Hari Om, Vishavdeep Goyal, Kunal Gupta
2015 International Journal of Computer Network and Information Security  
The main issue in such an environment is related to the authenticity of the user's identity by the system. This requires to have some mechanism to authenticate a remote user for his legitimacy.  ...  Our scheme provides a facility to a legitimate user for changing his password of his choice. This scheme withstands with several attacks without requiring much computational overhead.  ...  important authentication schemes, which use the smart cards.  ... 
doi:10.5815/ijcnis.2015.08.08 fatcat:kymxsc7vazeoljglsaratk6g6q

Efficient password authenticated key agreement using bilinear pairings

Wen-Shenq Juang, Wei-Ken Nien
2008 Mathematical and computer modelling  
In this paper, we propose an efficient and flexible password authenticated key agreement scheme using bilinear pairings.  ...  stored in a smart card is compromised, it can prevent the offline dictionary attack.  ...  [11] proposed a remote user authentication scheme using bilinear pairings.  ... 
doi:10.1016/j.mcm.2007.08.001 fatcat:k5dmdpkzrvhxpccjp7d4s6ormy

An Efficient and Reliable Three-Entity Remote User and Server Authentication Technique

C. Koner, C. T. Bhunia, U. Maulik
2009 International Journal of Engineering and Technology  
Recently Das proposed a flexible remote system authentication using smart card [7]. Xu et al. proved that Khan et al.'  ...  We also propose an improved remote user and server authentication that verifies the authenticity of user by user's password, smart card and biometric property of user.  ...  In 2006, Das et al. [7] developed a flexible remote user authentication scheme using smart card that authenticates user as well as remote sever.  ... 
doi:10.7763/ijet.2009.v1.35 fatcat:gmnnp64a4rfvnhgc4ctwxqkajy
« Previous Showing results 1 — 15 out of 5,259 results