scispace - formally typeset
Journal ArticleDOI

An Efficient and Practical Solution to Remote Authentication: Smart Card

Reads0
Chats0
TLDR
This work provides mutual authentication between the user and the server and achieves more functionality and requires much less computational cost than other smart card-based schemes.
About
This article is published in Computers & Security.The article was published on 2002-08-01. It has received 474 citations till now. The article focuses on the topics: Mutual authentication & Smart card.

read more

Citations
More filters
Journal ArticleDOI

An improved smart card based password authentication scheme with provable security

TL;DR: This work shows that smart card based password authentication scheme and remote user authentication scheme are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary.
Journal ArticleDOI

Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards

TL;DR: The weaknesses of Chien et al.'s scheme are shown, and an improved scheme with better security strength is proposed, which is vulnerable to a reflection attack and an insider attack.
Journal ArticleDOI

A password authentication scheme over insecure networks

TL;DR: This paper proposes a new password authentication scheme that can support the Diffie-Hellman key agreement protocol over insecure networks and users and the system can use the agreed session key to encrypt/decrypt their communicated messages using the symmetric cryptosystem.
Journal ArticleDOI

Efficient multi-server password authenticated key agreement using smart cards

TL;DR: A novel user authentication and key agreement scheme using smart cards for multi-server environments with much less computational cost and more functionality, which is a nonce-bayed scheme which does not have a serious time-synchronization problem.
Journal ArticleDOI

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

TL;DR: Security vulnerabilities of the multi-server cloud environment of the protocols proposed by Xue et al. and Chuang et al are shown and an informal cryptanalysis confirms that the protocol is protected against all possible security threats.
References
More filters
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI

A new remote user authentication scheme using smart cards

TL;DR: This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Journal ArticleDOI

An efficient remote use authentication scheme using smart cards

TL;DR: This paper proposes an efficient and practical remote user authentication scheme using smart cards that provides the same advantages as that of Hwang and Li's scheme, but also significantly reduces the communication and computation costs.
Related Papers (5)
Trending Questions (1)
How much will it cost to change my name on my Social Security card?

Compared with other smart card-based schemes, our solution achieves more functionality and requires much less computational cost.