搜索结果: 1-15 共查到“军队指挥学 Remote User Authentication”相关记录24条 . 查询时间(0.062 秒)
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Lattice-Based Cryptography Fuzzy Signatures Biometrics Reusability
2019/6/26
In this paper, we introduce a new construction of lattice-based reusable fuzzy signature for remote user authentication that is secure against quantum computers. We define formal security models for t...
Improved on an improved remote user authentication scheme with key agreement
user authentication key agreement cryptanalysis
2016/1/27
Recently, Kumari et al. pointed out that Chang et al.’s scheme “Untraceable
dynamic-identity-based remote user authentication scheme with verifiable password
update” not only has several drawbacks, ...
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
cryptographic protocols Authentication scheme
2016/1/9
A three-factor authentication combines biometrics information with user password and smart card to provide security-enhanced user authentication. An proposed user authentication scheme improved Das’s ...
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
Cryptanalysis Remote User Authentication Key Agreement
2015/12/30
In 2012, Wen and Li proposed a secure and robust dynamic identity based remote user authentication
scheme with key agreement using smart cards. They claimed that their scheme is efficient
and secure...
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Discrete logarithm problem Fingerprinting Hash functions
2015/12/29
In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common sessio...
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Biometrics user authentication smart cards security
2012/6/14
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, desi...
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Biometrics user authentication smart cards security
2012/3/20
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, desi...
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Biometrics user authentication smart cards security
2012/8/28
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, desi...
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards
cryptographic protocols / Authentication smart cards dynamic ID multi-server system password attack
2012/3/28
The security of a dynamic ID-based remote user authentication scheme for multi-server environment using smart cards proposed by Lee et al. [Lee, C-C., Lin, T-H., Chang, R-X., A Secure Dynamic ID based...
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards
cryptographic protocols / Authentication smart cards dynamic ID multi-server system password attack
2011/6/8
The security of a dynamic ID-based remote user authentication scheme for multi-server environment using smart cards proposed by Lee et al. [Lee, C-C., Lin, T-H., Chang, R-X., A Secure Dynamic ID based...
Weaknesses of a dynamic ID-based remote user authentication scheme
cryptographic protocols Authentication Security Cryptanalysis Smart card Attacks
2010/7/13
The security of a password authentication scheme using smart cards proposed by Khan et al. is analyzed. Four kinds of attacks are presented in different scenarios. The analyses show that the scheme is...
On security of a remote user authentication scheme without using smart cards
Authentication Security Cryptanalysis Smart card Attacks
2010/7/13
The security of a password authentication scheme using smart cards proposed by Rhee et al. is analyzed. A kind of impersonation attack is presented. The analyses show that the scheme is insecure for p...
Some Attack on the Security of a Novel Remote User Authentication Scheme
Login remote user and server access system network security security threats
2010/3/16
In 2009, Jena et al. proposed a novel remote user authentication
scheme using smart card based on ECDLP and
claimed that the proposed scheme withstands to security
threats. This paper shows that Je...
An Improved Timestamp-Based Password Remote User Authentication Scheme
Authentication personate attack smart card
2010/2/1
In 2003, Shen et al [4] proposed a timestamp-based password authentication
scheme in which remote server does not need to store the passwords or verification
table for users authentication. Unfortun...
Security Analysis of A Remote User Authentication Protocol by Liao and Wang
Authentication Smartcard Anonymity
2009/12/29
In Elsevier’s journal of Computer Standards & Interfaces, 2007, Liao and Wang
proposed an authentication protocol using smart card and claimed that their
protocol provides security against replay at...