Secure User-Friendly Remote Authentication Schemes
نویسندگان
چکیده
منابع مشابه
Remote User Authentication Schemes: A Review
To secure the resources or information from illegitimate users various kinds of authentication schemes have been designed and developed. Some of these schemes are vulnerable to a variety of attacks. In last decade authentication schemes based on smart card has been proposed to withstand the possible attacks on verification table. Smart card provides a convenient storage and processing capabilit...
متن کاملImproved Efficient Remote User Authentication Schemes
Recently, Yoon et al. proposed a new smart card based remote user authentication scheme. We show that this scheme is subject to forgery attacks if the information stored in the smart card is stolen. This violates the “twofactor security” objective of the smart card based remote user authentication schemes. We propose an amendment to this problem. We further propose two new schemes which are mor...
متن کاملA Forward Secure Remote User Authentication Scheme
Remote user authentication schemes allow a valid user to login a remote server. In 2000, Hwang and Li’s proposed a new remote user authentication scheme with smart cards. In the recent years,some researchers pointed out the security weaknesses of Hwang and Li’s scheme and they also proposed some modified schemes to avoid these weaknesses. This paper analyzes that Hwang and Li’s scheme does not ...
متن کاملAdvanced Secure Remote User Authentication Scheme Preserving User Anonymity
To ensure secure transmission of data and to authenticate remote user while accessing server resources, smart card based remote user authentication schemes have been widely adopted. In 2004, Das et al proposed first of its kind of protocol for remote user authentication with smart cards using Dynamic Id to protect user anonymity. In 2005, Chien et al pointed out that Das et al scheme failed to ...
متن کاملSecure Sessionbased Authentication Schemes
Authentication is a process of verifying the identity of someone (a user, device, or an entity) who wants to access data, resources, or applications. Validating the identity shall establish a trust relationship for further interactions. Authentication even enables the accountability by making it possible to integrate both access and actions to specific identities. There are a huge number of tec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information & Security: An International Journal
سال: 2006
ISSN: 0861-5160
DOI: 10.11610/isij.1806