The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In traditional symmetric authentication schemes for smart card, the smart card sends its card number in plaintext to verify the genuineness of the authentication server (AS), resulting in the leakage of some sensitive information and being attacked. Therefore, in this paper, to prevent the leakage of card number we propose a novel symmetric authentication scheme in which the card number is powered...
Protocols of user authentication are able to ensure the security of data transmission and users¡¦ communication over insecure networks. Among various authenticated mechanisms run currently, the password-based user authentication, because of its efficiency, is the most widely employed in different areas, such as computer networks, wireless networks, remote login, operation systems, and database management...
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2010, Chang et al. proposed an improved biometrics-based user authentication scheme without concurrency system which can withstand the forgery attack, the off-line password guessing attack, the replay attack, etc. In this paper, we analyze...
The two-factor authentication scheme combined password with smart card is one of the most widely used methods. This paper analyzes the security performance of a latest proposed remote user authentication scheme and simulates the attacks it suffers: it's vulnerability to the password guessing attack, the server masquerade attack and lacks of password backward security. Based on the detailed security...
Recently, Wang et al. showed that Das et al.'s dynamic ID-based remote user authentication scheme is vulnerable to an impersonation attack and can not achieve mutual authentication. Consequently, a more efficient and secure dynamic ID-based remote user authentication scheme was proposed and claimed that it was now secure and of practical value. However, in this paper, we will show that Wang et al...
To the best of our knowledge, all most previously proposed schemes based on smart cards which have the tamper resistance assumption for the smart card. However, many researches have shown that the secrets stored in a smart card can be breaches by analyzing the leaked information or monitoring the power consumption. This article will propose a new mutual authentication scheme based on nonce and smart...
In a recent paper in this journal, an enhanced novel access control protocol (ENACP) over wireless sensor networks was given for the problem of preventing malicious nodes from joining the sensor network based on elliptic curve cryptography (ECC) and hash chain. We show that the presented ENACP has a fatal weakness such that it is insecure to the active attack.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.