2012
DOI: 10.1016/j.compeleceng.2011.11.010
|View full text |Cite
|
Sign up to set email alerts
|

An improved dynamic ID-based remote user authentication with key agreement scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
66
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 111 publications
(66 citation statements)
references
References 12 publications
0
66
0
Order By: Relevance
“…Similar to JoI, the relative citedness of "on-board" articles is 124% compared to 99% of "off-board" articles. As for CEE (Figure 4), the correlation of days to accept and relative citedness is close to 0 as well (´0.04) and the highlighted outliers are Reference [16] with 383 days to accept and a citedness of 907% as a red rectangle and Reference [17] …”
Section: Resultsmentioning
confidence: 85%
“…Similar to JoI, the relative citedness of "on-board" articles is 124% compared to 99% of "off-board" articles. As for CEE (Figure 4), the correlation of days to accept and relative citedness is close to 0 as well (´0.04) and the highlighted outliers are Reference [16] with 383 days to accept and a citedness of 907% as a red rectangle and Reference [17] …”
Section: Resultsmentioning
confidence: 85%
“…In recent years, many dynamic identity-based remote login schemes [6,[16][17][18][19][20][21] have been proposed to provide mutual authentication between the user and the remote server. In any dynamic identity-based remote login scheme, users' anonymity [6,7,22] is an important security requirement.…”
Section: Users' Anonymity Problemmentioning
confidence: 99%
“…Studies have demonstrated that users tend to use the same password for different applications [4,19]. If the adversary, A , is a malicious insider of the remote server S and has learned U i 's password (a trivial exercise as U i sends his (ID i , PW i ) in plaintext form to S during the registration phase of Chao's scheme [16]), A may try to masquerade the user U i using the password PW i to access other servers.…”
Section: Insider Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Their scheme also allowed users to choose and change their passwords freely, and the server did not need to maintain a verifier [7] proposed an improved scheme based dynamic ID with mutual authentication, and proved that their scheme is more secure. However, many researches [8,9,10] demonstrated that Wang et al's proposal is vulnerable to various attacks such as randomly chosen password attack and impersonation attack, and the corresponding enhanced measures are proposed respectively. In 2012, Lee [11] identified that Das et al's scheme is insecure for guessing attack and impersonation attack, and proposed an improved scheme.…”
Section: Introductionmentioning
confidence: 99%