2015
DOI: 10.1109/cjece.2014.2344447
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multiserver Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…Moreover, a series of related works have been proposed in the context of identity authentication mechanisms that can be used for remote servers accessing [44]- [47]. Throughout the work proposed in [44], a dynamic ID based authentication scheme is introduced. This work is not only based on simple hash functions and some XORing operations but also uses password randomization for each session to improve the dynamic property of identity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, a series of related works have been proposed in the context of identity authentication mechanisms that can be used for remote servers accessing [44]- [47]. Throughout the work proposed in [44], a dynamic ID based authentication scheme is introduced. This work is not only based on simple hash functions and some XORing operations but also uses password randomization for each session to improve the dynamic property of identity.…”
Section: Related Workmentioning
confidence: 99%
“…In this part, we introduce both computation and communication costs comparison between the proposed approaches (IBE & PBE) and relevant works [44]- [47]. In addition, we present the security comparative study between the proposed approaches and the same related works.…”
Section: Computation and Security Comparisonsmentioning
confidence: 99%
“…In 2013, Li et al [9] also proposed an enhance dynamic ID based remote user authentication scheme. However, in 2015, Shunmuganathan et al [7] claimed that Li et al's protocol [9] has a flaw against the off-line password guessing attack, stolen smart card attack and forgery attack. They proposed an improved protocol to remedy the security weakness.…”
Section: Related Workmentioning
confidence: 99%
“…Shunmuganathan et al [7] claimed that their protocol can resist all known attack such as off-line password guessing attack, user impersonation attack and stolen smart card attack. After careful analysis, we found that their scheme is still vulnerable to off-line password guessing attack.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation