Sciweavers

Share
ESWA
2011
473views Database» more  ESWA 2011»
8 years 5 months ago
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
Abstract: The security of a dynamic ID-based remote user authentication scheme for multiserver environment using smart cards proposed by Lee et al. [Lee, C-C., Lin, T-H., Chang, R-...
Cheng-Chi Lee, Tsung-Hung Lin, Rui-Xiang Chang
CHI
2011
ACM
8 years 5 months ago
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Eiji Hayashi, Jason Hong, Nicolas Christin
BWCCA
2010
8 years 8 months ago
Comments on a One-Way Hash Chain Based Authentication for FMIPv6
In this paper, we analyze a one-way hash chain based authentication scheme proposed by Haddad and Krishnan. The authentication scheme has been introduced for improving handover per...
Ilsun You, Jong-Hyouk Lee
INFORMATICALT
2010
132views more  INFORMATICALT 2010»
8 years 10 months ago
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update
In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2...
Chiu-Hsiung Liao, Ching-Te Wang, Hon-Chan Chen
IEEECIT
2010
IEEE
8 years 12 months ago
Enabling Use of Single Password over Multiple Servers in Two-Server Model
—The two-server model is quite promising for password based authentication, well suited for the setting of federated enterprises. However, none of the existing two-server passwor...
Yanjiang Yang, Feng Bao
ADHOC
2007
134views more  ADHOC 2007»
9 years 1 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
CSI
2004
178views more  CSI 2004»
9 years 1 months ago
A flexible biometrics remote user authentication scheme
Recently, Lee, Ryu and Yoo proposed a fingerprint-based remote user authentication scheme by using smart cards and biometrics. Their scheme is based on two tiers of ElGamal's...
Chu-Hsing Lin, Yi-Yi Lai
CORR
2004
Springer
104views Education» more  CORR 2004»
9 years 1 months ago
Outflanking and securely using the PIN/TAN-System
The PIN/TAN
Alexander Wiesmaier, Marcus Fischer, Evangelos G. ...
TPDS
2008
116views more  TPDS 2008»
9 years 1 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
AMC
2005
131views more  AMC 2005»
9 years 1 months ago
A user friendly remote authentication scheme with smart cards against impersonation attacks
In 2000, Sun proposed an efficient remote user authentication scheme using smart cards without requiring a password table. However, the password of a user is an un-human lengthy p...
Chien-Lung Hsu
books