Cryptanalysis of Three Password‐Based Remote User Authentication Schemes with Non‐Tamper‐Resistant Smart Card

C Wang, G Xu - Security and Communication Networks, 2017 - Wiley Online Library
Remote user authentication is the first step to guarantee the security of online services.
Online services grow rapidly and numerous remote user authentication schemes were …

[PDF][PDF] Secure password-based remote user authentication scheme against smart card security breach

D Wang, CG Ma, QM Zhang, S Zhao - Journal of Networks, 2013 - researchgate.net
It is a challenge for password authentication protocols using non-tamper resistant smart
cards to achieve user anonymity, forward secrecy, immunity to various attacks and high …

Secure password-based remote user authentication scheme with non-tamper resistant smart cards

D Wang, C Ma, P Wu - Data and Applications Security and Privacy XXVI …, 2012 - Springer
Abstract In DBSec'11, Li et al. showed that Kim and Chung's password-based remote user
authentication scheme is vulnerable to various attacks if the smart card is non-tamper …

Robust smart‐card‐based remote user password authentication scheme

BL Chen, WC Kuo, LC Wuu - International Journal of …, 2014 - Wiley Online Library
Smart‐card‐based remote user password authentication schemes are commonly used for
providing authorized users a secure method for remotely accessing resources over insecure …

Cryptanalysis and improvement of 'a robust smart‐card‐based remote user password authentication scheme'

S Kumari, MK Khan - International Journal of Communication …, 2014 - Wiley Online Library
With the use of smart card in user authentication mechanisms, the concept of two‐factor
authentication came into existence. This was a forward move towards more secure and …

A robust remote user authentication scheme against smart card security breach

CT Li, CC Lee, CJ Liu, CW Lee - … Security and Privacy XXV: 25th Annual …, 2011 - Springer
Remote user authentication is important to identify whether communicating parties are
genuine and trustworthy using the password and the smart card between a login user and a …

Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards

D He, D Wang, S Wu - Information technology and control, 2013 - itc.ktu.lt
Recently, Chen et al.[B. Chen, W. Kuo, L. Wuu, A secure password-based remote user
authentication scheme without smart cards, Information Technology and Control 41 …

A robust remote user authentication scheme using smart card

CT Li, CC Lee - Information Technology and Control, 2011 - itc.ktu.lt
Remote user authentication is important to identify whether communicating parties are
genuine and trust-worthy using the password and the smart card between a login user and a …

Dynamic ID-based remote user password authentication schemes using smart cards: A review

R Madhusudhan, RC Mittal - Journal of Network and Computer …, 2012 - Elsevier
Remote user authentication is a mechanism, in which the remote server verifies the
legitimacy of a user over an insecure communication channel. Until now, there have been …

[PDF][PDF] Weaknesses of a Remote User Password Authentication Scheme Using Smart Card.

D He, J Chen, J Hu - Int. J. Netw. Secur., 2011 - ijns.jalaxy.com.tw
Remote authentication is a method to authenticate remote users over insecure
communication channel. Password-based authentication schemes have been widely …