W
Wen-Bin Hsieh
Researcher at National Taiwan University of Science and Technology
Publications - 12
Citations - 221
Wen-Bin Hsieh is an academic researcher from National Taiwan University of Science and Technology. The author has contributed to research in topics: Authentication & Password. The author has an hindex of 7, co-authored 11 publications receiving 194 citations.
Papers
More filters
Journal ArticleDOI
Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards
Jenq-Shiou Leu,Wen-Bin Hsieh +1 more
TL;DR: This study remedies the flaws of Lee et al .'s scheme and proposes an efficient improvement over it to prove that the computation cost, security and efficiency of the proposed scheme are well suitable for practical applications in a distributed system.
Journal ArticleDOI
An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures
Wen-Bin Hsieh,Jenq-Shiou Leu +1 more
TL;DR: An improved protocol is proposed to solve weaknesses in Hsiang and Shih’s remote user authentication protocol by enhancing the security, which is well suited for the practical environment.
Proceedings ArticleDOI
Design of a time and location based One-Time Password authentication scheme
Wen-Bin Hsieh,Jenq-Shiou Leu +1 more
TL;DR: A novel authentication scheme which exploits volatile passwords - One-Time Passwords (OTPs) based on the time and location information of the mobile device to transparently and securely authenticate users while accessing Internet services, such as online banking services and e-commerce transactions is proposed.
Journal ArticleDOI
A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks
Wen-Bin Hsieh,Jenq-Shiou Leu +1 more
TL;DR: It is shown that Vaidya et al.
Journal ArticleDOI
Exploiting hash functions to intensify the remote user authentication scheme
Wen-Bin Hsieh,Jenq-Shiou Leu +1 more
TL;DR: This paper describes how a malicious insider carries out an infringed account attack and then presents a resembling account attack on Hsiang-Shih's scheme, and proposes an improvement assisted by hashing functions to enhance the scheme.