An improved dos-resistant id-based password authentication scheme without using smart card
Tóm tắt
Từ khóa
Tài liệu tham khảo
L. Lamport. Password authenticated with insecure communication. Communications of the Association for Computing Machinery, 24(1981)11, 770–772.
H. S. Kim, S. W. Lee, and K. Y. Yoo. ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Operating Systems Review, 37(2003)4, 32–41.
X. F. Leng. Smart card application and security. Information Security Tech. Report, 14(2009)2, 36–45.
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Proceedings of 19th Annual International Cryptology Conference, California, USA, August 1999, 388–397.
T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(2002)5, 541–552.
S. K. Kim and M. G. Chung. More secure remote user authentication scheme. Computer Communications, 32(2009)6, 1018–1021.
M. S. Hwang, S. K. Chong, and T. Y. Chen. DoS-resistant ID-based password authentication scheme using smart cards. Journal of System and Software, 83 (2010)1, 163–172.
J. Xu, W. T. Zhu, and D. G. Feng. An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces, 31(2009)4, 723–728.
S. W. Lee, H. S. Kim, and K. Y. Yoo. Improvement of Chien et al.’s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 27 (2005)2, 181–183.
N. Y. Lee and Y. C. Chiu. Improved remote authentication scheme with smart card. Computer Standards & Interfaces, 27(2005)2, 177–180.
H. S. Rhee, J. O. Kwon, and D. H. Lee. A remote user authentication scheme without using smart cards. Computer Standards & Interfaces, 31(2009)1, 6–13.
C. I. Fan, Y. C. Chan, and Z. K. Zhang. Robust remote authentication scheme with smart cards. Computers & Security, 24(2005)8, 619–628.
M. K. Khan and J. Zhang. Improving the security of a flexible biometrics remote user authentication scheme. Computer Standards & Interfaces, 29(2007)1, 82–85.
J. H. Yang and C. C. Chang. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & Security, 28(2009)3–4, 138–143.
D. Hankerson, A. Menezes, and S. Vanstone. Guide to elliptic curve cryptography. New York, USA, Springer-Verlag, 2004, 75–147.
V. S. Miller. Use of elliptic curves in cryptography. Proceedings of 5th Annual International Cryptology Conference, California, USA, August 1985, 417–426.
T. Aura, P. Nikander, and J. Leiwo. DoS-resistant authentication with client puzzles. In Proceedings of the Eighth International Workshop on Security Protocols, Cambridge, UK, April 2011, Lecture Notes in Computer Science (2133), 170–177.
D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols. Communications of the Association for Computing Machinery, 24(1981)8, 533–536.