Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…The remote user authentication scheme is used to authenticate the legitimacy of the remote users over an insecure channel. Since last decade many elegant remote user authentication schemes using smart card have been proposed [4], [6], [8][9][10], [12][13][14][15][16][17], [21], [22], [24][25][26][27][28][29][30][31][32][33][34][35]. Smart card authentication scheme is usually composed of three phases namely; registration phase, login phase and authentication phase.…”
Section: Possible Attacks On Smart Card Authentication Schemementioning
confidence: 99%
See 2 more Smart Citations
“…The remote user authentication scheme is used to authenticate the legitimacy of the remote users over an insecure channel. Since last decade many elegant remote user authentication schemes using smart card have been proposed [4], [6], [8][9][10], [12][13][14][15][16][17], [21], [22], [24][25][26][27][28][29][30][31][32][33][34][35]. Smart card authentication scheme is usually composed of three phases namely; registration phase, login phase and authentication phase.…”
Section: Possible Attacks On Smart Card Authentication Schemementioning
confidence: 99%
“…Modified scheme has been proposed to overcome the parallel session attack [13]. However, still it is vulnerable to impersonation attack and reflection attack; does not provide user anonymity [14].…”
Section: Parallel Session Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Many research works depicting the application of password-based authentication schemes with smart cards to verify the legitimacy of remote user login requests have already been published [1,2,3,4,5,6,7]. In 1981, Lamport [8] proposed a password based authentication scheme though it failed to preserve user anonymity.…”
Section: Introductionmentioning
confidence: 99%
“…Various authentication schemes have been devised to frustrate different attack attempts on the sensitive information stored in servers. Recently because of the ease of use and computational capability of smart cards, a number of Password based authentication schemes with smart cards have been proposed [1][2][3]. These schemes can be categorized as static ID based [4,5] and dynamic ID based [6][7][8][9] schemes.…”
Section: Introductionmentioning
confidence: 99%