2005
DOI: 10.1016/j.amc.2004.11.033
|View full text |Cite
|
Sign up to set email alerts
|

An enhanced user authentication scheme for multi-server Internet services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
35
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 45 publications
(35 citation statements)
references
References 8 publications
0
35
0
Order By: Relevance
“…On the one hand, there are several schemes in multi-server environment were proposed [14,16,17],the schemes which can be suitable to multi-server environment have not been efficiently solved.On the other hand,these scheme are password-based and the smart card is used in it to store some user information.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…On the one hand, there are several schemes in multi-server environment were proposed [14,16,17],the schemes which can be suitable to multi-server environment have not been efficiently solved.On the other hand,these scheme are password-based and the smart card is used in it to store some user information.…”
Section: Introductionmentioning
confidence: 99%
“…In 2001,Tsaur [14] proposed a smart card based password authentication scheme in multi-server environments,which is the first scheme for password authentication scheme in multi-server environments.In Tsaur's scheme,an authorized user can login multi-servers with a single password chosen by him/herself,and the server need not maintain any verification table at all.Later,L.H.Li et al [16] and E.J.Yoon [17] et alproposed two new multi-server authentication schemes using neural network.But these schemes have some drawbacks such as they must spend much time in training neural networks,and constructing and maintaining neural networks in every single server will add up extra manpower and cost.Compared with these schemes,Tsaur's scheme does not need the cost constructing,training and maintaining neural networks.It is more efficient than the schemes in [16][17].…”
Section: Introductionmentioning
confidence: 99%
“…This makes password authentication extremely inconvenient. In recent years, there are many convenient password authentication schemes [15]- [19] developed in multi-server environments. These schemes used either a nonce or a timestamp technique to prevent the replay attack.…”
Section: Introductionmentioning
confidence: 99%
“…Although the Internet provides a convenient way for information sharing, the access to valuable information must be restricted to authorized users. Nowadays, many authentication schemes have been proposed to ensure the security of remote access [3] [4] [5] [8] [10] [11] [13] [15] [16] [17] [18].…”
Section: Introductionmentioning
confidence: 99%