2010
DOI: 10.15388/informatica.2010.293
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…Thus, the proposed mechanism provides extensibility. Audit: When authorized users possess the same rights to modify one specific document, the document owner or the system can trace who modifies it in the designed mechanism with a proper user authentication protocol (Chang et al, 2013;Liao et al, 2010). For audit, each user first registers at the system and needs to be authenticated to login to the system.…”
Section: Further Discussionmentioning
confidence: 99%
“…Thus, the proposed mechanism provides extensibility. Audit: When authorized users possess the same rights to modify one specific document, the document owner or the system can trace who modifies it in the designed mechanism with a proper user authentication protocol (Chang et al, 2013;Liao et al, 2010). For audit, each user first registers at the system and needs to be authenticated to login to the system.…”
Section: Further Discussionmentioning
confidence: 99%
“…The wide applications of communication services have accelerated the researches of various new or improved protocols (e.g., Liao et al, 2010;Tseng et al, 2010 andYoon andYoo, 2010). The correct implementation of a protocol must conform to the corresponding protocol specification, because the protocol conformance is one of basic prerequisites for errorless interactions among communicating entities.…”
Section: Introductionmentioning
confidence: 99%