Sciweavers

154 search results - page 1 / 31
» A Secure YS-Like User Authentication Scheme
Sort
View
IJNSEC
2010
143views more  IJNSEC 2010»
12 years 11 months ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar
ESWA
2011
473views Database» more  ESWA 2011»
12 years 8 months ago
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
Abstract: The security of a dynamic ID-based remote user authentication scheme for multiserver environment using smart cards proposed by Lee et al. [Lee, C-C., Lin, T-H., Chang, R-...
Cheng-Chi Lee, Tsung-Hung Lin, Rui-Xiang Chang
IJNSEC
2006
122views more  IJNSEC 2006»
13 years 4 months ago
A Hash-based Strong Password Authentication Protocol with User Anonymity
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that t...
Kumar V. Mangipudi, Rajendra S. Katti
INFORMATICALT
2007
109views more  INFORMATICALT 2007»
13 years 4 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
SOUPS
2009
ACM
13 years 11 months ago
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures
This paper investigate security of graphical authentication tokens against educated guess attacks. Results of two user studies indicate that, if we use original photos as authenti...
Eiji Hayashi, Jason Hong, Nicolas Christin