2012
DOI: 10.1080/09720529.2012.10698367
|View full text |Cite
|
Sign up to set email alerts
|

RSA based remote password authentication using smart card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 6 publications
0
16
0
Order By: Relevance
“…As far as user remote authentication for smart home environments is concerned, our liter-ature survey has revealed that techniques based on passwords [18] are typically weak and are not considered very secure. To improve this weakness, other techniques have been proposed such as those relying on the user's personal memory (or digital memory) [19], those relying on the use of Kerberos authentication to implement a single-sign-on [20], those relying on mobile OTP or OAuth [21], an open standard authentication and authorization protocol, in which the user receives a password that should be used within short time period after its generation, otherwise the OTP expires; those relying on smart cards [22], those relying on biometrics [23], those involving transactions based on Near Field Communications (NFC) [24], and those relying on RSA [9], [10], to name a few. The novel RSA-ASH-SC scheme proposed in this thesis belongs to this later class of protocols since its design relies on the use of a variant of RSA (so-called Om and Kumari scheme [10]), in which the anonymity of the user/device is achieved by using a one-time-token.…”
Section: Types Of Authentication Schemes For Smart Home Environmentsmentioning
confidence: 99%
See 4 more Smart Citations
“…As far as user remote authentication for smart home environments is concerned, our liter-ature survey has revealed that techniques based on passwords [18] are typically weak and are not considered very secure. To improve this weakness, other techniques have been proposed such as those relying on the user's personal memory (or digital memory) [19], those relying on the use of Kerberos authentication to implement a single-sign-on [20], those relying on mobile OTP or OAuth [21], an open standard authentication and authorization protocol, in which the user receives a password that should be used within short time period after its generation, otherwise the OTP expires; those relying on smart cards [22], those relying on biometrics [23], those involving transactions based on Near Field Communications (NFC) [24], and those relying on RSA [9], [10], to name a few. The novel RSA-ASH-SC scheme proposed in this thesis belongs to this later class of protocols since its design relies on the use of a variant of RSA (so-called Om and Kumari scheme [10]), in which the anonymity of the user/device is achieved by using a one-time-token.…”
Section: Types Of Authentication Schemes For Smart Home Environmentsmentioning
confidence: 99%
“…In [22], Om and Reddy proposed a RSA-based remote user authentication scheme using smart card. In their scheme, to achieve authentication, no verification table, nor password table is needed.…”
Section: Related Work On Remote User Authentication Schemes Using Smart Cardmentioning
confidence: 99%
See 3 more Smart Citations