Sciweavers

39 search results - page 3 / 8
» A Security Enhanced Timestamp-Based Password Authentication ...
Sort
View
INFORMATICALT
2007
109views more  INFORMATICALT 2007»
13 years 8 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 8 months ago
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh's legendary timestamp-base...
Al-Sakib Khan Pathan, Choong Seon Hong
IJNSEC
2006
92views more  IJNSEC 2006»
13 years 8 months ago
Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards
Recently, Yang et al. improved Yang and Shieh's two password authentication schemes to withstand Sun and Yeh's forgery attacks. However, Kim et al. pointed out that Yang...
Ren-Chiun Wang, Chou Chen Yang
CN
2007
97views more  CN 2007»
13 years 8 months ago
Security enhancement of an IC-card-based remote login mechanism
Wang et al. presented a remote password authentication scheme using IC (Integrated Circuit) cards in 2004. Unfortunately, we discovered that their scheme is unable to withstand th...
Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang
APNOMS
2007
Springer
14 years 2 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo