2017
DOI: 10.1016/j.jisa.2017.08.004
|View full text |Cite
|
Sign up to set email alerts
|

Security bound enhancement of remote user authentication using smart card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…Madhusudhan and Hegde [24] discussed a lightweight authentication scheme to address the vulnerabilities involved in WANG Ding et al [25]. The proposed system has lesser hash functions and reduced complex modular mathematical operations.…”
Section: Related Work a Literature Review Related To Public Key mentioning
confidence: 99%
See 1 more Smart Citation
“…Madhusudhan and Hegde [24] discussed a lightweight authentication scheme to address the vulnerabilities involved in WANG Ding et al [25]. The proposed system has lesser hash functions and reduced complex modular mathematical operations.…”
Section: Related Work a Literature Review Related To Public Key mentioning
confidence: 99%
“…• The tool facilitates automatic analysis techniques with the help of different back ends. AVISPA uses modular and expressive formal languages for specifying security protocols and their properties [23], [24]. The tool provides four different back ends namely, On-the-Fly Model-Checker (OFMC) [49], Constraint Logic based Attack Searcher (CL-Atse) [50], SAT-based model checker and tree automata based on an automatic approximation of security protocols to support security analysis [23].…”
Section: ) Avispa Overviewmentioning
confidence: 99%
“…(1) Mutual authentication: The basic requirement for good system communication is the identity authentication during the transmission process. The message must guarantee the validity of a sender and receiver [10,11]. (2) Non-repudiation: In the information transmission process, if each identity is not authenticated, the sender and the receiver are vulnerable to being sent false information by an impersonation attack.…”
Section: Requirementsmentioning
confidence: 99%
“…Once the receiver confirms that the message was sent from the sender, the sender can't deny the message that he/she had sent. The sender uses his/her private key to sign the message, and the receiver can verify the digital signature from the sender [30].…”
Section: Non-repudiationmentioning
confidence: 99%