Filters








5,284 Hits in 4.0 sec

An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks

S. Santhosh Baboo, K. Gokulraj
2012 International Journal of Computer Network and Information Security  
We introduced a new scheme to enhance and ensure the remote authentication through secure and dynamic authentication using a smart card, which is relatively a different approach.  ...  This scheme discusses the authentication procedure for smart card based network systems.  ...  A new remote user authentication scheme using smart cards was proposed by [4] in 2000. The Cryptanalysis of a remote user authentication scheme using Smart cards was analyzed by [5] in 2000.  ... 
doi:10.5815/ijcnis.2012.04.04 fatcat:7cy7mdkqlzgn7ccpypdlypppcu

A new secure mutual authentication scheme with smart cards using bilinear pairings

Hae-Jung Kim, Eun-Jun Yoon, Ki-Dong Bu
2014 International Journal of Mathematical Analysis  
This paper proposes a new secure mutual authentication scheme with smart cards using bilinear pairings.  ...  Up to now, various remote user authentication schemes with smart card using bilinear pairings were proposed by different researchers.  ...  This paper proposes a new secure mutual authentication scheme with smart cards using bilinear pairings.  ... 
doi:10.12988/ijma.2014.48269 fatcat:l2pgwscspvg25fxpjqzzjnr45q

An Efficient and Secure Remote Authentication Scheme Using Smart Cards

Chin-Chen Chang, Jung-San Lee
2006 Information & Security An International Journal  
Among them, the remote password authentication schemes using smart cards are regarded as very efficient.  ...  In 2000, Hwang and Li proposed a new remote authentication scheme using smart cards based on ElGamal's cryptosystem. Unfortunately, the scheme Hwang and Li propose suffers from some security flaws.  ...  49, no. 2 (May 2003): 414-416. 2 Min-Shiang Hwang and Li-Hua Li, "A New Remote User Authentication Scheme Using Smart Cards," IEEE Transactions on Consumer Electronics 46, no. 1 (February 2000): 28-30  ... 
doi:10.11610/isij.1807 fatcat:uuhylmwe5jekdd3im5e73a6v4a

An Enhanced Remote User Authentication Scheme with Smart Card

Manoj Kumar
2010 International Journal of Network Security  
In 2000, Hwang and Li's proposed a new remote user authentication scheme with smart cards.  ...  This paper present an enhanced remote user authentication scheme with smart card that not only resolves all the security problems of Hwang and Li's scheme, but also adds mutual authentication, session  ...  Further, they proposed a new remote user authentication scheme using smart cards.  ... 
dblp:journals/ijnsec/Kumar10 fatcat:lu5qlxtp7fe3jo45it4iwn7rdy

On the Security of "an efficient and complete remote user authentication scheme" [article]

Manik Lal Das
2008 arXiv   pre-print
Recently, Liaw et al. proposed a remote user authentication scheme using smart cards.  ...  Their scheme has claimed a number of features e.g. mutual authentication, no clock synchronization, no verifier table, flexible user password change, etc. We show that Liaw et al.'  ...  [2] proposed a remote user authentication scheme using smart cards.  ... 
arXiv:0802.2112v1 fatcat:rwycyyvnendobiu46va24fwale

Cryptanalysis and Enhancement of a Remote User Authentication Scheme Using Smart Cards
스마트카드를 이용한 사용자 인증 스킴의 안전성 분석 및 개선

Young-Sook Lee, Dong-Ho Won
2010 Journal of the Korea Society of Computer and Information  
In 2005, Liao et al. proposed a remote user authentication scheme using a smart card, in which users can be authenticated anonymously.  ...  A remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted  ...  In a typical password-based authentication scheme using smart cards, remote users are authenticated using their smart card as an identification token; the smart card takes as input a password from a user  ... 
doi:10.9708/jksci.2010.15.1.139 fatcat:doavuh4z3jhqbcwmfwtpgjqduy

A Novel Smart-Card Based Authentication Scheme Using Proactive Secret Sharing

Yuesheng Zhu, Bojun Wang, Cheng Cai
2016 International Journal of Computer and Communication Engineering  
Therefore, in this paper, we present an efficient mutual authentication scheme, which provides a practical solution for an industrial application system using smart cards.  ...  Traditional smart-card oriented authentication schemes provide a secure method for authorized users to login a remote server through insecure networks.  ...  We introduce our new authentication scheme using smart cards in this section, which has the feature of mutual authentication and can resist the masquerade attack.  ... 
doi:10.17706/ijcce.2016.5.3.196-205 fatcat:me64v3sbc5b6vomrqqqjxtvtmi

A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme

Preeti Chandrakar, Hari Om
2016 International Journal of Business Data Communications and Networking  
In this article, the authors have proposed a secure two-factor remote user authentication and session key agreement protocol.  ...  In addition, the performance evaluation and the security comparison have revealed that the presented scheme gives strong security as well as better complexity in the context of smart card memory requirement  ...  In 2002, Chien et al. (2002) proposed a new remote password authentication scheme based on smart card. They claimed that their scheme is more efficient and provide mutual authentication.  ... 
doi:10.4018/ijbdcn.2016070104 fatcat:5uyfx3m3tjcahmmpvwv7lr74me

An Enhanced Remote User Authentication Scheme

Xiaohui Yang, Xinchun Cui, Zhenliang Cao, Ziqiang Hu
2014 Engineering  
Mutual authentication is performed using a challenge-response handshake between user and server, and it avoids the problems of synchronism between smart card and the remote server.  ...  Remote user authentication schemes are used to verify the legitimacy of remote users' login request. Recently, several dynamic user authentication schemes have been proposed.  ...  in implementing a practical and universal remote user authentication scheme using smart cards.  ... 
doi:10.4236/eng.2014.66030 fatcat:tcnlquxi3rcwjeismjk3vqqfru

Cryptanalysis and an Efficient Secure ID-based Remote User Authentication using Smart Card

Ruhul Amin
2013 International Journal of Computer Applications  
Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature.  ...  To overcome these weakness, we have proposed an efficient secure ID based remote user authentication scheme using smart card based on cryptographic one way hash function.  ...  In 2011, Li and Lee proposed robust remote user authentication scheme using smart card to provide better authentication process and to resist all possible attacks.  ... 
doi:10.5120/13175-0909 fatcat:ulcx5ksys5eureduxie6j5u62u

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar
2011 Computer Communications  
Recently, Wang et al. proposed a dynamic ID-based remote user authentication scheme using smart cards.  ...  Currently, smart card-based remote user authentication schemes have been widely adopted due to their low computational cost and convenient portability for the authentication purpose.  ...  Revocation of smart card In our scheme, if a registered user's smart card is stolen or lost, he can request the remote server S to revoke his smart card for future use.  ... 
doi:10.1016/j.comcom.2010.02.011 fatcat:n7zrtw7z7vbhbf5hsnprgj5trm

Efficient and complete remote authentication scheme with smart cards

Wen-Gong Shieh, Wen-Bing Horng
2008 2008 IEEE International Conference on Intelligence and Security Informatics  
In this paper, along the line of cost effective approach using hash functions for authentication, we propose an efficient and practical remote user authentication scheme with smart cards to support the  ...  Index Terms�Mutual authentication, revocation, session key exchange, smart card, user anonymity Authorized licensed use limited to: Tamkang University.  ...  Of course, U's account is still kept in DB, U can re-register to S to obtain a new smart card with a new n value. 12. Efficient 2-way mutual authentication.  ... 
doi:10.1109/isi.2008.4565041 dblp:conf/isi/ShiehH08 fatcat:hqswa3smfvdntic6wuxzoleyxu

A Novel Smart Card-based Remote User Authentication Mechanism

Deborah Uwera, Dongho Won
2015 Computer Science and Information Technology  
This paper proposes a novel remote user authentication scheme using smart cards.  ...  Remote users attempting to login into a particular system would therefore have to authenticate themselves to the server and vice versa.  ...  In Section 2, we propose our new and secure Smart card-based remote user authentication scheme.  ... 
doi:10.13189/csit.2015.030404 fatcat:2x3mnbujk5gddgh7ye7hndvaee

Comments on "Improved Efficient Remote User Authentication Schemes" [article]

Manik Lal Das
2007 arXiv   pre-print
In this paper, we show that the Tian et al's schemes are insecure and vulnerable than the Yoon et al's scheme.  ...  Recently, Tian et al presented an article, in which they discussed some security weaknesses of Yoon et al's scheme and subsequently proposed two "improved" schemes.  ...  Without password and smart card, one can easily pass the mutual authentication and establish the session key. Therefore, the schemes lack two-factor authentication.  ... 
arXiv:0712.3037v1 fatcat:z25hdqfcrbagfbqy6hf2ka332a

An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card

Ram RatanAhirwal, Swarn Sanjay Sonwanshi
2012 International Journal of Applied Information Systems  
Song proposed advanced smart card based password authentication protocol with such non-tamper resistant smart card based on symmetric key cryptosystem as well as modular exponentiation. R.  ...  In this article, we will propose an efficient ID-based authentication scheme which can avoid all type of security flaws.  ...  In 2011, Chun-Ta Li and Cheng-Chi Lee [15] present a robust remote user authentication scheme using smart card.  ... 
doi:10.5120/ijais12-450188 fatcat:vjsg2canlfaffeapjr2olze3be
« Previous Showing results 1 — 15 out of 5,284 results