A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture
[chapter]
2012
Lecture Notes in Computer Science
Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. In NSS'10, Shao and Chin pointed out that Hsiang and Shih's dynamic ID-based remote user authentication scheme for multi-server environment is vulnerable to server spoofing attack and fails to preserve user anonymity, and further proposed an improved version which is claimed to be efficient and secure. In this study, however, we will demonstrate that, although
doi:10.1007/978-3-642-34601-9_35
fatcat:vewndib3w5honnyenwplcxxci4