Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2005
DOI: 10.1016/j.comnet.2005.01.013
|View full text |Cite
|
Sign up to set email alerts
|

Efficient remote user authentication scheme using smart card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2006
2006
2010
2010

Publication Types

Select...
4
3
3

Relationship

2
8

Authors

Journals

citations
Cited by 35 publications
(11 citation statements)
references
References 11 publications
(10 reference statements)
0
11
0
Order By: Relevance
“…Over the past years, many remote user authentication schemes have been proposed in [2][3][4][5][6][7][8][9][10][11]. In this section, a new remote user authentication scheme is proposed based on the one-time SMS4 algorithm, CKS, EKS and a variety of selfencryption technology [5] [11].…”
Section: Identity Authentication Based the One-time Sms4 And Combimentioning
confidence: 99%
“…Over the past years, many remote user authentication schemes have been proposed in [2][3][4][5][6][7][8][9][10][11]. In this section, a new remote user authentication scheme is proposed based on the one-time SMS4 algorithm, CKS, EKS and a variety of selfencryption technology [5] [11].…”
Section: Identity Authentication Based the One-time Sms4 And Combimentioning
confidence: 99%
“…Therefore, during the last couple of decades, smart cards have been utilized excessively in electronic commerce. For example, based upon smart cards, many user authentication schemes have been put forth to authenticate login users (e.g., [1,2]). …”
Section: Introductionmentioning
confidence: 99%
“…At the lower layers, the smart cards implement mechanisms in order to authenticate the terminal and vice versa. Recently, numerous works concerning remote authentication with smart card have been and are being developed [15,16], and even questioned [17]. Note that these approaches are focused on user authentication or terminal authentication but not so many efforts have been addressed on authenticated and authorized access to networks from the chip card point of view.…”
Section: Introductionmentioning
confidence: 99%