2003
DOI: 10.1016/s0167-4048(03)00616-3
|View full text |Cite
|
Sign up to set email alerts
|

A user friendly remote authentication scheme with smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
57
0

Year Published

2005
2005
2014
2014

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 82 publications
(58 citation statements)
references
References 6 publications
0
57
0
Order By: Relevance
“…U i randomly chooses his password PW i and sends the pair (ID i , h(PW i )) to the server. Almost all existing user authentication schemes [3,7,[10][11][12][13]15,[17][18][19][20]22] presume the existence of a secure channel in the registration phase. This usually means the private registration data are submitted in person or through an existing secure channel.…”
Section: Registration Phasementioning
confidence: 99%
See 2 more Smart Citations
“…U i randomly chooses his password PW i and sends the pair (ID i , h(PW i )) to the server. Almost all existing user authentication schemes [3,7,[10][11][12][13]15,[17][18][19][20]22] presume the existence of a secure channel in the registration phase. This usually means the private registration data are submitted in person or through an existing secure channel.…”
Section: Registration Phasementioning
confidence: 99%
“…Furthermore, the user also needs to compute the session key as Equation (20). The session key computation mentioned above does not appear in Pathan et al's schemes [17,18] because their schemes did not provide key agreement.…”
Section: Authentication Phasementioning
confidence: 99%
See 1 more Smart Citation
“…Many elegant schemes in this area were proposed to address various security and efficiency aspects such as replay attack [2]- [5], parallel session attack [6], mutual authentication [2], [6], [7], necessity of a verification table [2], [7], [8], [10], user impersonation [9]- [12], ID-theft [12]- [14], and communication and computation overhead [2], [4], [7], [10]. However, the preservation of user privacy has been much less investigated with respect to password-based authentication.…”
Section: Introductionmentioning
confidence: 99%
“…But in most of these schemes, only the user is authenticated. 26,27,28 Therefore, in this article the authors propose an efficient and secure authentication scheme. The proposed scheme not only provides mutual authentication between the remote server and the user but also increases the efficiency of authentication.…”
Section: Introductionmentioning
confidence: 99%