A strong user authentication scheme with smart cards over unsecure channels

سال انتشار: 1394
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 605

فایل این مقاله در 19 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

RSTCONF01_368

تاریخ نمایه سازی: 30 آبان 1394

چکیده مقاله:

The strong and reliable user authentication is one of the important issues that still is remained as a goal for researchers in the field. Li, Lee and Wang proposed a two-factor user authentication scheme in 0212. Their scheme was an improvement on Yoon et al. algorithm which was unable to resist denial of service attack and performs only user authentication. The algorithm provided by Li, Lee and Wang has three phases including registration phase, login phase and authentication phase and provided mutual authentication and they claim it can resist potential attacks. Unfortunately, this research showed that Li, Lee and Wang’s scheme is failed in insider attack and cannot assure user’s anonymity. In this paper, a novel mechanism based on Li, Lee and Wang’s scheme which can eliminate the vulnerability with the use of nonce and salted hash, is proposed. Our scheme also has a freely change password phase and does not need to involve registration center

نویسندگان

Hakimeh Ameri

MSC in E-Commerce, Department of Industrial Engineering, KN Toosi University Of Technology, Tehran, Iran corresponding author

Shahriar Mohammadi

Assistant Professor of Industrial Engineering Department, KN Toosi University Of Technology, Tehran, Iran;

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Chang, Chin-Chen, and Ting-Fang Cheng. " A robust and efficient ...
  • He, Daojing, Maode Ma, Yan Zhang, Chun Chen, and Jiajun ...
  • Li, Chun-Ta, Cheng-Chi Lee, Hsing Mei, and Chia-Hao Yang. " ...
  • Xu, Jing, Wen-Tao Zhu, and Deng-Guo Feng. " An efficient ...
  • _ Liao, Y. P.. & Wang, S. S. (20 09). ...
  • Hsiang, Han-Cheng, and Wei-Kuan Shih. "Improvement of the Secure dynamic ...
  • Lee, C. C., Lin, T. H. & Chang, R. X. ...
  • Yoon, Eun-Jun, Eun-Kyung Ryu, and Kee-Young Yoo. " An improvement ...
  • Chun-Ta Li, Cheng-Chi Lee and Lian-Jun Wang. _ Two-Factor User ...
  • Liao, Yi-Pin, and Chih-Ming Hsiao. " A novel multi-server remote ...
  • Rogaway, P. (2004, January). Nonce-based symmetric encryption. In Fast Software ...
  • Chen, T. H.. Hsiang, H. C.. & Shih, W K. ...
  • نمایش کامل مراجع