An improved timestamp-based remote user authentication scheme
AK Awasthi, K Srivastava, RC Mittal - Computers & Electrical Engineering, 2011 - Elsevier
AK Awasthi, K Srivastava, RC Mittal
Computers & Electrical Engineering, 2011•ElsevierTo protect the remote server from various malicious attacks, many authentication schemes
have been proposed. Some schemes have to maintain a password verification table in the
remote server for checking the legitimacy of the login users. To overcome potential risks of
verification tables, researchers proposed remote user authentication schemes using
smartcard, in which the remote server only keeps a secret key for computing the user's
passwords and does not need any verification table for verifying legal user. In 2003 Shen …
have been proposed. Some schemes have to maintain a password verification table in the
remote server for checking the legitimacy of the login users. To overcome potential risks of
verification tables, researchers proposed remote user authentication schemes using
smartcard, in which the remote server only keeps a secret key for computing the user's
passwords and does not need any verification table for verifying legal user. In 2003 Shen …
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme.
Elsevier
Showing the best result for this search. See all results