2012 IEEE Students' Conference on Electrical, Electronics and Computer Science 2012
DOI: 10.1109/sceecs.2012.6184815
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Smart card based Remote User Authentication Scheme using hash function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(19 citation statements)
references
References 9 publications
0
19
0
Order By: Relevance
“…al. protocol [20], as it forms the basic two factor based protocol for SA protocol. Table 2 shows that SA protocol require more computational cost than Sonwanshi et.…”
Section: Performance Analysismentioning
confidence: 99%
“…al. protocol [20], as it forms the basic two factor based protocol for SA protocol. Table 2 shows that SA protocol require more computational cost than Sonwanshi et.…”
Section: Performance Analysismentioning
confidence: 99%
“…The traditional schemes were based on passwords [1][2][3], making it vulnerable to simple dictionary attacks. Thereafter, to increase the security, smart card based authentication schemes were introduced [4][5][6]. But, due to the advancement of computer technology, these schemes are still not capable to withstand various possible attacks [7].…”
Section: Introductionmentioning
confidence: 99%
“…Later many researchers [33] have cryptanalyzed M.L Das et al scheme and proposed their improved versions. Recently Sonwanshi et al [15] have proposed a password-based remote user authentication scheme using the smart card, which uses only bitwise XOR operations, one way hash function. Later A.K Das et al [34] cryptanalyzed sonwanshi et al scheme and shown that their scheme is vulnerable to offline password guessing attack, stolen smart card attack and proposed their improved version.…”
Section: Introductionmentioning
confidence: 99%