English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21656370      Online Users : 307
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 管理學院 > 國際企業學系 > 期刊論文 >  Item 310904400/79672


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/79672


    Title: Robust Smart-Card-Based Remote User Password Authentication Scheme
    Authors: 陳柏淩;CHEN, BAE-LING;Kuo, Wen-Chu;Kuo, Wen-Chung;Wuu, Lih-Chy;Wuu, Lih-Chyau
    Contributors: 資訊多媒體應用學系
    Keywords: smart card;session key agreement;mutual authentication;internal attack;stolen-smart-card attack
    Date: 2014
    Issue Date: 2014-06-05 03:50:59 (UTC+0)
    Abstract: Smart-card-based remote user password authentication schemes are commonly used for providing authorized users a secure method for remotely accessing resources over insecure networks. In 2009, Xu et al. proposed a smart-card-based password authentication scheme. They claimed their scheme can withstand attacks when the information stored on the smart card is disclosed. Recently, Sood et al. and Song discovered that the smart-card-based password authentication scheme of Xu et al. is vulnerable to impersonation and internal attacks. They then proposed their respective improved schemes. However, we found that there are still flaws in their schemes: the scheme of Sood et al. does not achieve mutual authentication and the secret key in the login phase of Song's scheme is permanent and thus vulnerable to stolen-smart-card and off-line guessing attacks. In this paper, we will propose an improved and efficient smart-card-based password authentication and key agreement scheme. According to our analysis, the proposed scheme not only maintains the original secret requirement but also achieves mutual authentication and withstands the stolen-smart-card attack.
    Relation: INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS,27(2),377–389.
    Appears in Collections:[國際企業學系] 期刊論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML359View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback