1999
DOI: 10.1016/s0167-4048(99)80136-9
|View full text |Cite
|
Sign up to set email alerts
|

Password authentication schemes with smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
116
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 270 publications
(123 citation statements)
references
References 16 publications
0
116
0
Order By: Relevance
“…In 1999, Yang and Shieh [2] proposed two password authentication schemes with smart cards one of which was the timestamp-based password authentication scheme. In 2002, Chan and Cheng [3] showed that [2] is vulnerable to forged login attack and an adversary could be able to impersonate as a legal user to pass the system authentication.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…In 1999, Yang and Shieh [2] proposed two password authentication schemes with smart cards one of which was the timestamp-based password authentication scheme. In 2002, Chan and Cheng [3] showed that [2] is vulnerable to forged login attack and an adversary could be able to impersonate as a legal user to pass the system authentication.…”
Section: Related Workmentioning
confidence: 99%
“…In 2002, Chan and Cheng [3] showed that [2] is vulnerable to forged login attack and an adversary could be able to impersonate as a legal user to pass the system authentication. Fan et.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations