A Practical Password Management Scheme based on Computer Hardware Information and IC card

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Security-Enhanced Password Management Scheme based on Needham’s Scheme

R. M. Needham mentioned a Personal Identification Number (PIN) management scheme for Automatic Teller Machine (ATM) transactions which provides enhanced privacy and the responsibility separation [10]. This scheme was described as a rough example which supports his idea on security research under the changing computing environment. Though it shows a new approach to the role separation between a ...

متن کامل

Cryptanalysis of a smart card based secure password authentication scheme

Recently, Wang and Chang proposed a password authentication scheme is embedded in a smart card. This new verifier authenticates the login password key in without password table adoption. The safety aspects for this protocol were constructed on the basis of intensity factors and discrete logarithm. Nonetheless, in the year of 2008, Yoon et al. pointed out that there was a security loophole withi...

متن کامل

Security Issues in Smart Card Based Password Authentication Scheme

To secure information from unauthorized access, various authentication schemes have been deployed. Among these, password based authentication schemes using smart card are widely used for various applications such as remote user login, online banking, ID verification, access control and e-commerce. It provides mutual authentication between user and server. However, previous schemes are vulnerabl...

متن کامل

Secure Smart Card Based Password Authentication Scheme with User Anonymity

Recently, a smart card based authentication and key agreement scheme preserving the user anonymity was proposed by Wang, Juang and Lei, that is designed to provide users with secure activities in ubiquitous computing environments. The authors proved that their scheme delivers important security properties and functionalities, such as without maintaining password/verification tables, freedom on ...

متن کامل

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

As the most prevailing two-factor authentication mechanism, smart card based password authentication has been a subject of intensive research in the past decade and hundreds of this type of schemes have been proposed. However, most of them were found severely flawed, especially prone to the smart card security breach problem, shortly after they were first put forward, no matter the security is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: DEStech Transactions on Computer Science and Engineering

سال: 2018

ISSN: 2475-8841

DOI: 10.12783/dtcse/csae2017/17530