Sciweavers

32 search results - page 2 / 7
» Improving the Novikov and Kiselev User Authentication Scheme
Sort
View
JCIT
2010
189views more  JCIT 2010»
13 years 24 days ago
Weaknesses of a Secure Dynamic ID Based Remote User Authentication Scheme
In 2009, Liao and Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environments. They achieved user anonymity by using secure dynamic IDs...
Bae-Ling Chen, Wen-Chung Kuo, Yu-Shuan Chu
ICUIMC
2009
ACM
14 years 16 days ago
Bilinear-pairing-based remote user authentication schemes using smart cards
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
Al-Sakib Khan Pathan, Choong Seon Hong
CSI
2007
192views more  CSI 2007»
13 years 6 months ago
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards, in which only few hashing operations are required. Later, Ku et al. gave an improved sc...
Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhamma...
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 6 months ago
Comments on "Improved Efficient Remote User Authentication Schemes"
Recently, Tian et al. presented an article, in which they discussed some security weaknesses of Yoon et al.'s scheme and subsequently proposed two "improved" scheme...
Manik Lal Das
CSREASAM
2008
13 years 7 months ago
Efficient Biometrics Remote User Authentication Scheme
Recently, bio-information has been playing an important role in modern user authentication schemes. In 2004, Lin and Lai proposed a flexible biometrics remote user authentication s...
Ming-Jheng Li, Justie Su-tzu Juan