Sciweavers

39 search results - page 2 / 8
» Improved on an improved remote user authentication scheme wi...
Sort
View
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 5 months ago
Comments on "Improved Efficient Remote User Authentication Schemes"
Recently, Tian et al. presented an article, in which they discussed some security weaknesses of Yoon et al.'s scheme and subsequently proposed two "improved" scheme...
Manik Lal Das
AMC
2005
172views more  AMC 2005»
13 years 4 months ago
An efficient nonce-based authentication scheme with key agreement
In this paper, we propose a cost effective mutual authentication scheme with key agreement using smart cards. Our scheme is motivated by the scheme design in two articles publishe...
Yen-Cheng Chen, Lo-Yao Yeh
IJNSEC
2008
66views more  IJNSEC 2008»
13 years 5 months ago
Improving the Novikov and Kiselev User Authentication Scheme
Novikov and Kiselev [7] proposed an authentication method of a user from a remote autonomous object. Recently, Yang et al. [12] and Awasthi [1] have pointed out that the Novikov-K...
Min-Ho Kim, Çetin Kaya Koç
CSREASAM
2008
13 years 6 months ago
Efficient Biometrics Remote User Authentication Scheme
Recently, bio-information has been playing an important role in modern user authentication schemes. In 2004, Lin and Lai proposed a flexible biometrics remote user authentication s...
Ming-Jheng Li, Justie Su-tzu Juan