Journal ArticleDOI
An Efficient and Practical Solution to Remote Authentication: Smart Card
Reads0
Chats0
TLDR
This work provides mutual authentication between the user and the server and achieves more functionality and requires much less computational cost than other smart card-based schemes.About:
This article is published in Computers & Security.The article was published on 2002-08-01. It has received 474 citations till now. The article focuses on the topics: Mutual authentication & Smart card.read more
Citations
More filters
Journal ArticleDOI
An improved smart card based password authentication scheme with provable security
Jing Xu,Wen Tao Zhu,Dengguo Feng +2 more
TL;DR: This work shows that smart card based password authentication scheme and remote user authentication scheme are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary.
Journal ArticleDOI
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
Wei-Chi Ku,Shuai-Min Chen +1 more
TL;DR: The weaknesses of Chien et al.'s scheme are shown, and an improved scheme with better security strength is proposed, which is vulnerable to a reflection attack and an insider attack.
Journal ArticleDOI
A password authentication scheme over insecure networks
TL;DR: This paper proposes a new password authentication scheme that can support the Diffie-Hellman key agreement protocol over insecure networks and users and the system can use the agreed session key to encrypt/decrypt their communicated messages using the symmetric cryptosystem.
Journal ArticleDOI
Efficient multi-server password authenticated key agreement using smart cards
TL;DR: A novel user authentication and key agreement scheme using smart cards for multi-server environments with much less computational cost and more functionality, which is a nonce-bayed scheme which does not have a serious time-synchronization problem.
Journal ArticleDOI
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
TL;DR: Security vulnerabilities of the multi-server cloud environment of the protocols proposed by Xue et al. and Chuang et al are shown and an informal cryptanalysis confirms that the protocol is protected against all possible security threats.
References
More filters
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Journal ArticleDOI
Password authentication with insecure communication
TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI
A new remote user authentication scheme using smart cards
Min-Shiang Hwang,Li-Hua Li +1 more
TL;DR: This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Journal ArticleDOI
An efficient remote use authentication scheme using smart cards
TL;DR: This paper proposes an efficient and practical remote user authentication scheme using smart cards that provides the same advantages as that of Hwang and Li's scheme, but also significantly reduces the communication and computation costs.