원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Two user authentication schemes were recently proposed using smart cards. They do not need to maintain a verification table in registration server, which is one of the good and necessary aspect in the password based schemes. In this paper, we show that they are not secure against some attacks. Then we propose a robust remote user authentication scheme to withstand the flaws in them but preserve the same merits of them. Our scheme could be efficiently used in wireless communication applications.
목차
Abstract
1. Introduction
2. Review of Authentication Schemes
2.1 Wang-Liu-Dan's Scheme
2.2 Kim-Chung's Scheme
3. Security Flaws in Authentication Schemes
3.1 Wang-Liu-Dan's Scheme
3.2 Kim-Chung's Scheme
4. Robust User Authentication Scheme
5. Analysis
6. Conclusion
Reference
1. Introduction
2. Review of Authentication Schemes
2.1 Wang-Liu-Dan's Scheme
2.2 Kim-Chung's Scheme
3. Security Flaws in Authentication Schemes
3.1 Wang-Liu-Dan's Scheme
3.2 Kim-Chung's Scheme
4. Robust User Authentication Scheme
5. Analysis
6. Conclusion
Reference
저자정보
참고문헌
자료제공 : 네이버학술정보