D Wang, CG Ma, QM Zhang, S Zhao - Journal of Networks, 2013 - researchgate.net
It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high …
D Wang, C Ma, P Wu - Data and Applications Security and Privacy XXVI …, 2012 - Springer
Abstract In DBSec'11, Li et al. showed that Kim and Chung's password-based remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper …
BL Chen, WC Kuo, LC Wuu - International Journal of …, 2014 - Wiley Online Library
Smart‐card‐based remote user password authentication schemes are commonly used for providing authorized users a secure method for remotely accessing resources over insecure …
S Kumari, MK Khan - International Journal of Communication …, 2014 - Wiley Online Library
With the use of smart card in user authentication mechanisms, the concept of two‐factor authentication came into existence. This was a forward move towards more secure and …
CT Li, CC Lee, CJ Liu, CW Lee - … Security and Privacy XXV: 25th Annual …, 2011 - Springer
Remote user authentication is important to identify whether communicating parties are genuine and trustworthy using the password and the smart card between a login user and a …
D He, D Wang, S Wu - Information technology and control, 2013 - itc.ktu.lt
Recently, Chen et al.[B. Chen, W. Kuo, L. Wuu, A secure password-based remote user authentication scheme without smart cards, Information Technology and Control 41 …
CT Li, CC Lee - Information Technology and Control, 2011 - itc.ktu.lt
Remote user authentication is important to identify whether communicating parties are genuine and trust-worthy using the password and the smart card between a login user and a …
R Madhusudhan, RC Mittal - Journal of Network and Computer …, 2012 - Elsevier
Remote user authentication is a mechanism, in which the remote server verifies the legitimacy of a user over an insecure communication channel. Until now, there have been …
D He, J Chen, J Hu - Int. J. Netw. Secur., 2011 - ijns.jalaxy.com.tw
Remote authentication is a method to authenticate remote users over insecure communication channel. Password-based authentication schemes have been widely …