On vulnerability analysis of several password authentication protocols

Innovations in Systems and Software Engineering - Tập 11 Số 3 - Trang 167-176 - 2015
Keith Garrett1, Sampath Talluri1, Swapnoneel Roy1
1School of Computing, University of North Florida, Jacksonville, FL, 32224, USA

Tóm tắt

Từ khóa


Tài liệu tham khảo

Chen BL, Kuo WC, Wuu LC (2012) A secure password-based remote user authentication scheme without smart cards. Inf Technol Control 41(1):53–59

Chen BL, Kuo WC, Wuu LC (2014) Robust smart-card-based remote user password authentication scheme. Int J Commun Syst 27(2):377–389. doi: 10.1002/dac.2368

Harish P, Roy S (2014) Energy oriented vulnerability analysis on authentication protocols for cps. In: 2014 IEEE international conference on distributed computing in sensor systems (DCOSS), pp 367–371. doi: 10.1109/DCOSS.2014.52

Islam SH (2014) Design and analysis of an improved smartcard-based remote user password authentication scheme. Int J Commun Syst. doi: 10.1002/dac.2793

Jiang Q, Ma J, Li G, Ma Z (2013) An improved password-based remote user authentication protocol without smart cards. Inf Technol Control 42(2):113–123

Jiang Q, Ma J, Li G, Ma Z (2013) Improvement of robust smart-card-based password authentication scheme. Int J Commun Syst

Li CT, Lee CC (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math Comput Model 55(12):35–44. doi: 10.1016/j.mcm.2011.01.010 . http://www.sciencedirect.com/science/article/pii/S0895717711000136 . (Advanced Theory and Practice for Cryptography and Future Security)

Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371. doi: 10.1016/j.jnca.2013.02.034 . http://www.sciencedirect.com/science/article/pii/S1084804513000726

Orman H (1998) The OAKLEY key determination protocol

Rhee HS, Kwon JO, Lee DH (2009) A remote user authentication scheme without using smart cards. Comput Stand Interfaces 31(1):6–13. doi: 10.1016/j.csi.2007.11.017 . http://www.sciencedirect.com/science/article/pii/S0920548907001158

Song R (2010) Advanced smart card based password authentication protocol. Comput Stand Interfaces 32(5–6):321–325. doi: 10.1016/j.csi.2010.03.008

Wang D, Ma C, Zhang QM, Zhao S (2013) Secure password-based remote user authentication scheme against smart card security breach. JNW 8(1):148–155

Yang FY, Hsu CW, Chiu SH (2014) Password authentication scheme preserving identity privacy. In: 2014 Sixth international conference on measuring technology and mechatronics automation (ICMTMA), pp 443–447. doi: 10.1109/ICMTMA.2014.108