Proceedings of the 4th International Conference on Ubiquitous Information Technologies &Amp; Applications 2009
DOI: 10.1109/icut.2009.5405752
|View full text |Cite
|
Sign up to set email alerts
|

Complementary Scheme of Remote User Access over Insecure Networks

Abstract: Password authentication over unreliable networks is the most popular method in the Internet and mobile communication environments. Lately, Peyravian and Jeffries proposed the password-based remote user authentication protocol, password change, and session key establishment over insecure networks without requiring and any additional privatekey or public-key infrastructure. However, Peyravian-Jeffries's protocols have the security flaws against off-line password guessing attacks and DOS attacks. In this paper we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 13 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?