Security Analysis and Enhancements of a User Authentication Scheme

被引:0
|
作者
Liu, Wan-Rong [1 ]
He, Xin [2 ]
Ji, Zhi-Yong [1 ]
机构
[1] Shanghai Sixth People’s Hospital East affiliated to Shanghai University of Medicine, Health Sciences, Shanghai,201306, China
[2] Department of Engineering Science and Technology, Shanghai Ocean University, Shanghai,201306, China
来源
关键词
Authentication protocols - BAN logic - Internal attacks - Replay attack - Security analysis - User authentication scheme;
D O I
暂无
中图分类号
学科分类号
摘要
35
引用
下载
收藏
页码:895 / 903
相关论文
共 50 条
  • [21] Security enhanced user authentication scheme for wireless sensor network
    Jannati, Hoda
    Falahati, Abolfazl
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 215 - 228
  • [22] Security of a remote user authentication scheme using smart cards
    Yeh, HT
    Sun, HM
    Hsieh, BT
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (01) : 192 - 194
  • [23] Security Vulnerabilities of User Authentication Scheme Using Smart Card
    Pippal, Ravi Singh
    Jaidhar, C. D.
    Tapaswi, Shashikala
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 106 - 113
  • [24] Security enhancement of user authentication scheme for wireless sensor networks
    Lee, Yung-Cheng
    Hsieh, Yi-Chih
    You, Peng-Sheng
    Lee, Pei-Ju
    ICIC Express Letters, Part B: Applications, 2014, 5 (02): : 327 - 332
  • [25] Improving the security of 'a flexible biometrics remote user authentication scheme'
    Khan, Muhammad Khurram
    Zhang, Jiashu
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 82 - 85
  • [26] Security enhancement for a low computation cost user authentication scheme
    Sattarzadeh, Behnam
    Asadpour, Mahdi
    Jalili, Rasool
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 5 - +
  • [27] Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
    Mohammad Sabzinejad Farash
    Peer-to-Peer Networking and Applications, 2016, 9 : 82 - 91
  • [29] Security Analysis on Remote User Authentication Methods
    Soni, Mukesh
    Patel, Tejas
    Jain, Anuj
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 506 - 513
  • [30] Security Analysis of Robust User Authentication Protocol
    Pura, Mihai-Lica
    Patriciu, Victor-Valeriu
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460