A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
The intent of this paper is to review some timestampbased password authentication schemes using smart cards which have similar working principles. Many of the proposed timestampbased password authentication schemes were subsequently found to be insecure. Here, we investigate three schemes with simil...
Main Author: | Pathan, Al-Sakib Khan |
---|---|
Format: | Article |
Language: | English |
Published: |
Kohat University of Science and Technology (KUST), Pakistan
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/802/ http://irep.iium.edu.my/802/ http://irep.iium.edu.my/802/1/5653-19903-1-PB.pdf |
Similar Items
-
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007) -
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006) -
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006) -
Online authentication using smart card technology in mobile phone infrastructure
by: Mantoro, Teddy, et al.
Published: (2011) -
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)