Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update
Published 2013 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update
Authors
Keywords
-
Journal
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
Volume 28, Issue 2, Pages 374-382
Publisher
Wiley
Online
2013-10-12
DOI
10.1002/dac.2676
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update
- (2013) Ya-Fen Chang et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- An enhanced smart card based remote user password authentication scheme
- (2013) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme
- (2013) Xiong Li et al. MATHEMATICAL PROBLEMS IN ENGINEERING
- Applying biometrics to design three-factor remote user authentication scheme with key agreement
- (2013) Xiong Li et al. Security and Communication Networks
- A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
- (2012) Xiong Li et al. MATHEMATICAL AND COMPUTER MODELLING
- Detecting SYN flooding attacks based on traffic prediction
- (2012) Shangguang Wang et al. Security and Communication Networks
- A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
- (2012) Debiao He et al. Security and Communication Networks
- An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
- (2011) He Debiao et al. Information Fusion
- An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
- (2011) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’
- (2010) Muhammad Khurram Khan et al. COMPUTER COMMUNICATIONS
- Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture
- (2010) Kuo-Hui Yeh et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
- (2010) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Two robust remote user authentication protocols using smart cards
- (2010) Kuo-Hui Yeh et al. JOURNAL OF SYSTEMS AND SOFTWARE
- A more efficient and secure dynamic ID-based remote user authentication scheme
- (2008) Yan-yan Wang et al. COMPUTER COMMUNICATIONS
- A secure dynamic ID based remote user authentication scheme for multi-server environment
- (2007) Yi-Pin Liao et al. COMPUTER STANDARDS & INTERFACES
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started