Sood, 2011 - Google Patents
An improved and secure smart card-based authentication schemeSood, 2011
View PDF- Document ID
- 15664861404342939742
- Author
- Sood S
- Publication year
- Publication venue
- International Journal of Multimedia Intelligence and Security
External Links
Snippet
Kim and Chung (2009) found that Yoon and Yoo's scheme (2005) easily reveals a user's password and is susceptible to masquerading user attack, masquerading server attack and stolen verifier attack. Therefore, Kim and Chung proposed a new remote user authentication …
- 238000004891 communication 0 description 18
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sood et al. | An improvement of Xu et al.'s authentication scheme using smart cards | |
Wang et al. | Secure password-based remote user authentication scheme with non-tamper resistant smart cards | |
Jiang et al. | An improved password-based remote user authentication protocol without smart cards | |
Sood | An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol. | |
Karuppiah et al. | Cryptanalysis and an improvement of new remote mutual authentication scheme using smart cards | |
Wang et al. | Secure password-based remote user authentication scheme against smart card security breach | |
Ma et al. | Cryptanalysis and improvement of Sood et al.’s dynamic ID-based authentication scheme | |
Leea et al. | An S/Key-like one-time password authentication scheme using smart cards for smart meter | |
Tapiador et al. | Cryptanalysis of Song's advanced smart card based password authentication protocol | |
Sood et al. | An improvement of Liou et al.’s authentication scheme using smart cards | |
Lee et al. | Improvement of the EIGamal based remote authentication scheme using smart cards | |
Sood et al. | An improvement of Liao et al.'s authentication scheme using smart cards | |
Sood | Dynamic identity based authentication protocol for two-server architecture | |
Srivastava et al. | A review on remote user authentication schemes using smart cards | |
Sood et al. | Secure dynamic identity-based remote user authentication scheme | |
Sood | Advanced dynamic identity-based authentication protocol using smart card | |
Gao et al. | Cryptanalysis of three dynamic ID-based remote user authentication schemes using smart cards | |
Sood | An improved and secure smart card-based authentication scheme | |
Horng et al. | A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards | |
Sudhakar et al. | Secured mutual authentication between two entities | |
EP3361670B1 (en) | Multi-ttp-based method and device for verifying validity of identity of entity | |
Chen et al. | A secure YS-like user authentication scheme | |
Sharma et al. | A robust multi-factor remote user authentication scheme for cloud-IoT services | |
Obeidat et al. | An authentication model based on cryptography | |
Lee et al. | Vulnerabilities in a remote agent authentication scheme using smart cards |