Security flaws in two improved remote user authentication schemes using smart cards
Published 2012 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Security flaws in two improved remote user authentication schemes using smart cards
Authors
Keywords
-
Journal
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
Volume 27, Issue 10, Pages 2215-2227
Publisher
Wiley
Online
2012-11-08
DOI
10.1002/dac.2468
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Security Flaws in Three Password-Based Remote User Authentication Schemes with Smart Cards
- (2012) Kyung-Ah Shim CRYPTOLOGIA
- An improved dynamic ID-based remote user authentication with key agreement scheme
- (2011) Fengtong Wen et al. COMPUTERS & ELECTRICAL ENGINEERING
- Further Improved Remote User Authentication Scheme
- (2011) Jung-Yoon KIM et al. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUT
- An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
- (2011) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Robust smart-cards-based user authentication scheme with user anonymity
- (2011) Shuhua Wu et al. Security and Communication Networks
- Robust authentication and key agreement scheme preserving the privacy of secret key
- (2010) Ren-Chiun Wang et al. COMPUTER COMMUNICATIONS
- Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’
- (2010) Muhammad Khurram Khan et al. COMPUTER COMMUNICATIONS
- Advanced smart card based password authentication protocol
- (2010) Ronggong Song COMPUTER STANDARDS & INTERFACES
- Security enhancement on an improvement on two remote user authentication schemes using smart cards
- (2010) Tien-Ho Chen et al. Future Generation Computer Systems-The International Journal of eScience
- New dynamic ID authentication scheme using smart cards
- (2010) Jia-Lun Tsai et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture
- (2010) Kuo-Hui Yeh et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- A secure dynamic identity based authentication protocol for multi-server architecture
- (2010) Sandeep K. Sood et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Two robust remote user authentication protocols using smart cards
- (2010) Kuo-Hui Yeh et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
- (2009) Xiangxue Li et al. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
- A more efficient and secure dynamic ID-based remote user authentication scheme
- (2008) Yan-yan Wang et al. COMPUTER COMMUNICATIONS
- An improved smart card based password authentication scheme with provable security
- (2008) Jing Xu et al. COMPUTER STANDARDS & INTERFACES
- Mobile Privacy in Wireless Networks-Revisited
- (2008) Caimu Tang et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Two-factor mutual authentication based on smart cards and passwords
- (2008) Guomin Yang et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- Cryptanalysis of a password authentication scheme over insecure networks
- (2007) Tao Xiang et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExplorePublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More