𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Smart card based secure password authentication scheme

✍ Scribed by Wang Shiuh-Jeng; Chang Jin-Fu


Publisher
Elsevier Science
Year
1996
Tongue
English
Weight
570 KB
Volume
15
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Security enhancement for the timestamp-b
✍ Jau-Ji Shen; Chih-Wei Lin; Min-Shiang Hwang πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 272 KB

In 1999, Yang and Shieh proposed a timestamp-based password authentication scheme with smart cards. However, Chan and Cheng showed that it was insecure because the scheme was vulnerable to the forged login attack. In this paper, we propose a modified Yang-Shieh scheme to enhance security. Our modifi

A password authentication scheme with se
✍ Chun-Li Lin; Tzonelih Hwang πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 109 KB

## Recently, Hwang and Yeh proposed an improvement on the Peyravian-Zunic password scheme. The Hwang-Yeh scheme comprises a password authentication protocol, a password change protocol, and can also provide key distribution. Though the Hwang-Yeh scheme repaired several security problems of the Peyra

New dynamic ID authentication scheme usi
✍ Jia-Lun Tsai; Tzong-Chen Wu; Kuo-Yu Tsai πŸ“‚ Article πŸ“… 2010 πŸ› John Wiley and Sons 🌐 English βš– 179 KB

## Abstract Recently, Yoon __et al__. and Wang __et al__. independently proposed a dynamic ID authentication scheme and claimed that their schemes can withstand the risk of ID‐theft, and several attacks. In this paper, we first demonstrate that both of the proposed schemes cannot achieve the securi

An enhancement of timestamp-based passwo
✍ Lei Fan; Jian-Hua Li; Hong-Wen Zhu πŸ“‚ Article πŸ“… 2002 πŸ› Elsevier Science 🌐 English βš– 92 KB

Yang and Shieh proposed a timestamp-based password authentication scheme. Chan and Cheng proved that it is insecure. In this paper, we will give a further cryptanalysis of the scheme, and give an easier attack on it. Finally, we will propose an improved scheme that can withstand both of the attacks.