Sciweavers

75 search results - page 4 / 15
» A flexible biometrics remote user authentication scheme
Sort
View
COMPSEC
2006
94views more  COMPSEC 2006»
13 years 5 months ago
A novel remote user authentication scheme using bilinear pairings
Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.'s scheme and mad...
Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati...
CSI
2007
192views more  CSI 2007»
13 years 5 months ago
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards, in which only few hashing operations are required. Later, Ku et al. gave an improved sc...
Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhamma...
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 5 months ago
Comments on "Improved Efficient Remote User Authentication Schemes"
Recently, Tian et al. presented an article, in which they discussed some security weaknesses of Yoon et al.'s scheme and subsequently proposed two "improved" scheme...
Manik Lal Das
IJNSEC
2008
66views more  IJNSEC 2008»
13 years 5 months ago
Improving the Novikov and Kiselev User Authentication Scheme
Novikov and Kiselev [7] proposed an authentication method of a user from a remote autonomous object. Recently, Yang et al. [12] and Awasthi [1] have pointed out that the Novikov-K...
Min-Ho Kim, Çetin Kaya Koç
INFORMATICALT
2007
109views more  INFORMATICALT 2007»
13 years 5 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu