2009
DOI: 10.1016/j.csi.2008.11.002
|View full text |Cite
|
Sign up to set email alerts
|

Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
303
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 266 publications
(303 citation statements)
references
References 16 publications
0
303
0
Order By: Relevance
“…In recent years, many dynamic identity-based remote login schemes [6,[16][17][18][19][20][21] have been proposed to provide mutual authentication between the user and the remote server. In any dynamic identity-based remote login scheme, users' anonymity [6,7,22] is an important security requirement.…”
Section: Users' Anonymity Problemmentioning
confidence: 99%
See 3 more Smart Citations
“…In recent years, many dynamic identity-based remote login schemes [6,[16][17][18][19][20][21] have been proposed to provide mutual authentication between the user and the remote server. In any dynamic identity-based remote login scheme, users' anonymity [6,7,22] is an important security requirement.…”
Section: Users' Anonymity Problemmentioning
confidence: 99%
“…Before introducing the proposed attacks, we describe the following widely used assumptions about the power of an adversary A [10,11,15,18,22,28,29]. (A1) A can sniff the communication media through which U i and S communicate with each other i.e., A can intercept, block, inject, remove, or modify, any messages transmitted in the media.…”
Section: Cryptanalysis Of Chao's Smartcard-based User Authentication mentioning
confidence: 99%
See 2 more Smart Citations
“…Since then a considerable amount of research [1][2][3][4][5][6][7][8][9][10] has been carried out in this field. In 2009, Hsiang and Shih [1] showed that Liao-Wang [2] scheme cannot resist insider attack, masquerade attack, and server spoofing attack, meanwhile, the scheme cannot achieve mutual authentication. And they proposed an enhanced scheme on Liao-Wang scheme, However, Sood et al [3] pointed out that Hsiang et al's scheme is still insecure; it fails to resist replay attack, impersonation attack and stolen smart attack.…”
Section: Introductionmentioning
confidence: 99%