2016
DOI: 10.1007/s11277-016-3297-6
|View full text |Cite
|
Sign up to set email alerts
|

Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
68
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(69 citation statements)
references
References 15 publications
1
68
0
Order By: Relevance
“…This subsection describes the threat model. Based on previous researches [5][6][7][8][9][10][11][12][13][14][16][17][18][19], we constructed several common assumptions, including the capabilities of an attacker.…”
Section: Threat Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…This subsection describes the threat model. Based on previous researches [5][6][7][8][9][10][11][12][13][14][16][17][18][19], we constructed several common assumptions, including the capabilities of an attacker.…”
Section: Threat Modelmentioning
confidence: 99%
“…In this section, we briefly review the Kaul and Awasthi's scheme [14] to examine the cryptanalysis on their scheme. It consists of the following phases: registration, login, authentication, and password change.…”
Section: Review Of the Kaul And Awasthi's Schemementioning
confidence: 99%
See 1 more Smart Citation
“…In 2016, Kang et al [44] showed that Djellali et al 's scheme [45] suffers from offline dictionary attack, impersonation attack, and replay attack and then developed an enhanced scheme that achieves user anonymity with a Markov chain; and Kaul et al [46] also designed an improved authentication scheme based on Kumari et al 's scheme [34]. These schemes all claim to be resistant to various attacks, such as offline dictionary attack and impersonation attack.…”
Section: Our Contributionsmentioning
confidence: 99%
“…Kaul et al 's Scheme. This section gives a brief review of Kaul et al 's scheme [46] (Figure 3), and password change phase is also omitted.…”
Section: Security and Communication Networkmentioning
confidence: 99%