Password based remote authentication scheme using ECC for smart card
Citations
12 citations
7 citations
Cites background from "Password based remote authenticatio..."
...In [16], [5], secure access control approaches were proposed to manage the web accesses....
[...]
1 citations
Cites background from "Password based remote authenticatio..."
..., password authentication [4, 15], ID-based authentication [9, 21], were...
[...]
Cites background from "Password based remote authenticatio..."
...It is necessary to replace or alter the long term secret key [9]....
[...]
References
7,514 citations
2,874 citations
"Password based remote authenticatio..." refers background or methods in this paper
...The Lamport [1] scheme is not secure, due to some vulnerability....
[...]
...REFERENCES [1] L. Lamport (1981), Password authentication with insecure communication, Communication of the ACM, Vol. 24, No. 11, pp. 770-772, 1981....
[...]
...RELATED WORK In 1981, Lamport [1] proposed a remote password authentication scheme using a password table to achieve user authentication....
[...]
...RELATED WORK In 1981, Lamport [1] proposed a remote password authentication scheme using a password table to achieve user authentication....
[...]
2,351 citations
863 citations
"Password based remote authenticatio..." refers methods in this paper
...Later, Shen [14] analyzed impersonation attack of Chan [9] on Hwang Li’s [8] scheme, and suggested methods to repulse the attack....
[...]
...A remote user authentication scheme using smart card was proposed by Hwang–Li [8]....
[...]
474 citations
"Password based remote authenticatio..." refers background in this paper
...Different types of password authentication schemes have been proposed in [4], [5], [6], [7], [9], [13], [11], [12], [10] and [20]....
[...]
...[11] scheme to prevent the above-mentioned weaknesses....
[...]
...[11] scheme is vulnerable and can be compromised....
[...]