2012
DOI: 10.5772/50912
|View full text |Cite
|
Sign up to set email alerts
|

A Remote User Authentication Scheme with Anonymity for Mobile Devices

Abstract: With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e‐commerce. When a remote server provides such e‐commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card‐based authentication scheme that provides … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…In this subsection, we check the proposed scheme if it is safe and can resist various attacks efficiently more than Djellali's scheme and other existed scheme . Theorem Proposed scheme resists insider attackProof There is a riskiness that a server's insider can directly obtain the user's password from the registration message.…”
Section: Analysis Of Proposed Schemementioning
confidence: 98%
See 2 more Smart Citations
“…In this subsection, we check the proposed scheme if it is safe and can resist various attacks efficiently more than Djellali's scheme and other existed scheme . Theorem Proposed scheme resists insider attackProof There is a riskiness that a server's insider can directly obtain the user's password from the registration message.…”
Section: Analysis Of Proposed Schemementioning
confidence: 98%
“…In this subsection, we show a comparison of the amount of computation and execution time for the proposed scheme to existing other schemes . In comparing computational amount, we defined some parameters as follows:…”
Section: Analysis Of Proposed Schemementioning
confidence: 99%
See 1 more Smart Citation
“…Hafizul Islam et al showed that Debiao's scheme cannot withstand the clock synchronization problem, many logged‐in users' problem, known key session‐specific temporary attack, impersonation attack, privilege‐insider attack, inability to protect user's anonymity, and no provision for changing/updating private key with same identity. Shin et al proposed a security enhancement scheme of mutual authentication and user anonymity using smart cards.…”
Section: Related Workmentioning
confidence: 99%
“…This is "Security as a Service." BYOD (Bring Your Own Device) and MDM (Mobile Device Management) are now the main issues for many enterprises adopting mobile devices 19,20 .…”
Section: Literature Reviewmentioning
confidence: 99%