Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2002
DOI: 10.1016/s0167-4048(02)00415-7
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Practical Solution to Remote Authentication: Smart Card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
174
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 393 publications
(187 citation statements)
references
References 18 publications
0
174
0
Order By: Relevance
“…1) Calculates C 8 = H(C 2 || N s || B s ) 2) Checks whether C 8 = C 7 . If the values are equal, the server authenticates the user and mutual authentication is achieved.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…1) Calculates C 8 = H(C 2 || N s || B s ) 2) Checks whether C 8 = C 7 . If the values are equal, the server authenticates the user and mutual authentication is achieved.…”
Section: Discussionmentioning
confidence: 99%
“…In addition, change of password is also allowed in their scheme. One way hash functions were used by Chien [7] in their remote mutual authentication scheme. Unfortunately, their scheme is susceptible to insider attack as shown by Chen [8].…”
Section: Related Workmentioning
confidence: 99%
“…The ability to provide security guarantees is of paramount importance and several initiatives have been proposed to address this concern. Due to the low computation cost and portability of smartcard and easy memorization of user chosen password, two-factor smartcard authentication [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21] using password is commonly used in Internet-based applications such as remote user/server login, online banking, Pay-TV, electronic voting, secret online order placement.…”
Section: Introductionmentioning
confidence: 99%
“…For example in 2002, Chien et al [2] proposed one such scheme, but was subsequently found to be vulnerable to reflection and insider attacks [3]. To remove these drawbacks, Ku and Chen [3] designed another improved scheme, but Wang et al [4] demonstrated that the scheme is insecure against off-line password guessing attack, forgery attack and denial of service (DoS) attack, and proposed another improved scheme.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation