2011
DOI: 10.1016/j.jnca.2010.11.011
|View full text |Cite
|
Sign up to set email alerts
|

A secure dynamic identity based authentication protocol for multi-server architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
152
1

Year Published

2012
2012
2017
2017

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 209 publications
(153 citation statements)
references
References 18 publications
(20 reference statements)
0
152
1
Order By: Relevance
“…Generally, identity and password of the user are low entropy in cryptography, that means the adversary can guess the identity and password individually using dictionary attack in polynomial time. But, the adversary cannot guess identity and password simultaneously in on-line/off-line within a polynomial time as pointed out in [34]. According to our adversary model, we consider two following cases:…”
Section: Modelmentioning
confidence: 99%
“…Generally, identity and password of the user are low entropy in cryptography, that means the adversary can guess the identity and password individually using dictionary attack in polynomial time. But, the adversary cannot guess identity and password simultaneously in on-line/off-line within a polynomial time as pointed out in [34]. According to our adversary model, we consider two following cases:…”
Section: Modelmentioning
confidence: 99%
“…To remedy these flaws, Hsiang and Shih proposed an improvement over Liao and Wang's protocol. In 2010, Sood et al [11] found that Hsiang and Shih protocol is also found to be flawed for replay attack, impersonation attack and stolen smart card attack.…”
Section: Related Workmentioning
confidence: 99%
“…Since then a considerable amount of research [1][2][3][4][5][6][7][8][9][10] has been carried out in this field. In 2009, Hsiang and Shih [1] showed that Liao-Wang [2] scheme cannot resist insider attack, masquerade attack, and server spoofing attack, meanwhile, the scheme cannot achieve mutual authentication.…”
Section: Introductionmentioning
confidence: 99%
“…In 2009, Hsiang and Shih [1] showed that Liao-Wang [2] scheme cannot resist insider attack, masquerade attack, and server spoofing attack, meanwhile, the scheme cannot achieve mutual authentication. And they proposed an enhanced scheme on Liao-Wang scheme, However, Sood et al [3] pointed out that Hsiang et al's scheme is still insecure; it fails to resist replay attack, impersonation attack and stolen smart attack. And they proposed a secure dynamic identity based authentication scheme.…”
Section: Introductionmentioning
confidence: 99%