Journal ArticleDOI
Improved remote authentication scheme with smart card
Narn-Yih Lee,Yu-Chung Chiu +1 more
TLDR
A forgery attack on the Wu–Chieu scheme is shown and an improvement to resist the security flaw is proposed.About:
This article is published in Computer Standards & Interfaces.The article was published on 2005-01-01. It has received 126 citations till now. The article focuses on the topics: Multi-factor authentication & Challenge–response authentication.read more
Citations
More filters
Journal ArticleDOI
An efficient biometrics-based remote user authentication scheme using smart cards
Chun-Ta Li,Min-Shiang Hwang +1 more
TL;DR: An efficient biometric-based remote user authentication scheme using smart cards, in which the computation cost is relatively low compared with other related schemes and the security is based on the one-way hash function, biometrics verification and smart card.
Journal ArticleDOI
An improved smart card based password authentication scheme with provable security
Jing Xu,Wen Tao Zhu,Dengguo Feng +2 more
TL;DR: This work shows that smart card based password authentication scheme and remote user authentication scheme are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary.
Journal ArticleDOI
Advanced smart card based password authentication protocol
TL;DR: It is shown that the improved smart card authentication scheme proposed by Xu-Zhu-Feng is vulnerable to internal and impersonation attacks, and an improvement of their solution is proposed, and a new efficient strong smart card Authentication protocol is presented.
Journal ArticleDOI
A Secure Authentication Scheme for Telecare Medicine Information Systems
TL;DR: A novel authentication scheme is proposed that is added the pre-computing idea within the communication process to avoid the time-consuming exponential computations and is shown to be more secure and practical for telecare medicine environments.
Journal ArticleDOI
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
TL;DR: The author shows that the improved scheme provides strong authentication with the use of verifying biometric, password as well as random nonces generated by the user and the server as compared to that for the Li-Hwang's scheme and other related schemes.
References
More filters
Journal ArticleDOI
Password authentication with insecure communication
TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI
A new remote user authentication scheme using smart cards
Min-Shiang Hwang,Li-Hua Li +1 more
TL;DR: This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Journal ArticleDOI
An efficient remote use authentication scheme using smart cards
TL;DR: This paper proposes an efficient and practical remote user authentication scheme using smart cards that provides the same advantages as that of Hwang and Li's scheme, but also significantly reduces the communication and computation costs.
Journal ArticleDOI
Remote password authentication with smart cards
Chin-Chen Chang,Tzong-Chen Wu +1 more
TL;DR: A remote password authentication scheme based on the Chinese remainder theorem is proposed that can verify the remote password without verification tables and provide a signature scheme and communication timestamps in the authentication phase against the potential attacks of replaying a previously intercepted login request.
Journal ArticleDOI
Research: Remote login authentication scheme based on a geometric approach
TL;DR: A smart card-oriented remote login authentication scheme is presented, based on some simple properties of Euclidean geometry, which shows how the login and authentication phases can be achieved easily.
Related Papers (5)
An improved smart card based password authentication scheme with provable security
Jing Xu,Wen Tao Zhu,Dengguo Feng +2 more