Security Analysis and Enhancements of a User Authentication Scheme

被引:0
|
作者
Liu, Wan-Rong [1 ]
He, Xin [2 ]
Ji, Zhi-Yong [1 ]
机构
[1] Shanghai Sixth People’s Hospital East affiliated to Shanghai University of Medicine, Health Sciences, Shanghai,201306, China
[2] Department of Engineering Science and Technology, Shanghai Ocean University, Shanghai,201306, China
来源
关键词
Authentication protocols - BAN logic - Internal attacks - Replay attack - Security analysis - User authentication scheme;
D O I
暂无
中图分类号
学科分类号
摘要
35
引用
下载
收藏
页码:895 / 903
相关论文
共 50 条
  • [41] Security enhancement of a remote user authentication scheme using bilinear pairings and ECC
    Vo, Duc-Liem
    Kim, Kwangjo
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 144 - 147
  • [42] Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards
    WANG DingMA Chunguang College of Computer Science and TechnologyHarbin Engineering UniversityHarbin China Automobile Management Institute of PLABengbu China
    The Journal of China Universities of Posts and Telecommunications, 2012, 19 (05) : 104 - 114
  • [43] A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks
    Yoo, Sang Guun
    Park, Keun Young
    Kim, Juho
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [44] A Robust Remote User Authentication Scheme against Smart Card Security Breach
    Li, Chun-Ta
    Lee, Cheng-Chi
    Liu, Chen-Ju
    Lee, Chin-Wen
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 231 - 238
  • [46] Security enhancement for a dynamic ID-based remote user authentication scheme
    Liao, IE
    Lee, CC
    Hwang, MS
    International Conference on Next Generation Web Services Practices, 2005, : 437 - 440
  • [47] Security analysis of authentication scheme with anonymity for wireless environments
    Wei, Yongzhuang
    Qiu, Hongbing
    Hu, Yupu
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 535 - +
  • [48] Security analysis and enhancements of 3GPP authentication and key agreement protocol
    Zhang, MX
    Fang, YG
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2005, 4 (02) : 734 - 742
  • [49] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417
  • [50] ANALYSIS AND IMPROVEMENT OF AN ACCESS-CONTROL SCHEME WITH USER AUTHENTICATION
    YEN, SM
    LAIH, CS
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (05): : 271 - 273