2002
DOI: 10.1145/567331.567335
|View full text |Cite
|
Sign up to set email alerts
|

A flexible remote user authentication scheme using smart cards

Abstract: In 1999, Hwang and Li proposed a new user authentication scheme using smart cards. The scheme does not need any password or verification table. Later, Sun proposed an efficient remoteuse authentication scheme to improve the efficiency of the Hwang-Li scheme. However, these two schemes do not allow users to freely choose and change their passwords. In this article, we shall propose a simple and efficient remote user authentication scheme that allows users to freely choose and change their passwords without sign… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
32
0

Year Published

2005
2005
2017
2017

Publication Types

Select...
7
3

Relationship

2
8

Authors

Journals

citations
Cited by 117 publications
(32 citation statements)
references
References 10 publications
0
32
0
Order By: Relevance
“…However, passwords narrow down the possibilities and make it easier for attackers to mount guessing attacks [3]. Most of these types of schemes [9][10][11] require symmetric cryptosystems, and others require public-key cryptosystems [12] to protect passwords which are transferred over an unsecured network.…”
Section: Introductionmentioning
confidence: 99%
“…However, passwords narrow down the possibilities and make it easier for attackers to mount guessing attacks [3]. Most of these types of schemes [9][10][11] require symmetric cryptosystems, and others require public-key cryptosystems [12] to protect passwords which are transferred over an unsecured network.…”
Section: Introductionmentioning
confidence: 99%
“…However, M. S. Hwang found the weakness [2] of T. C. Wu's scheme and then improved the security in the authentication process [3] by using ElGamal's public key cryptosystem [4]. Many modified methods [5]- [10] based on Hwang 's scheme were presented to enhance the security.…”
Section: Introductionmentioning
confidence: 99%
“…Also, smart card is due to their low computation cost and convenient for the authentication purpose [1][2][3][4][5][6][7][8][9]. However, most of these schemes are based on static ID and have some flaws such as stolen, replay attack, insider attack, and impersonation attack, tracing attack.…”
Section: Introductionmentioning
confidence: 99%