完整後設資料紀錄
DC 欄位語言
dc.contributor.authorKu, Wei-Chi
dc.contributor.authorTsai, Hao-Chuan
dc.contributor.authorChen, Shuai-Min
dc.date.accessioned2009-06-02T08:40:36Z
dc.date.accessioned2020-07-05T06:31:31Z-
dc.date.available2009-06-02T08:40:36Z
dc.date.available2020-07-05T06:31:31Z-
dc.date.issued2006-06-08T08:32:11Z
dc.date.submitted2003-12-18
dc.identifier.urihttp://dspace.fcu.edu.tw/handle/2376/1725-
dc.description.abstractExisting one-time password authentication schemes can be categorized into two types, weak-password authentication schemes and strong-password authentication schemes. Generally, the strong-password authentication schemes have the advantages over the weak-password authentication schemes in that their computational overhead are lighter, designs are simpler, and implementations are easier, and therefore are especially suitable for some constrained environments. Recently, Lin, Sun, and Hwang proposed a strong-password authentication scheme, OSPA, which was later found to be vulnerable to a stolen-verifier attack and a man-in-the-middle attack. Later, Lin, Shen, and Hwang proposed an improved version of OSPA and showed that the improved scheme can resist the guessing attack, the replay attack, the impersonation attack, and the stolen-verifier attack. Herein, we show that their scheme is still vulnerable to a replay attack and a denial- of-service attack.
dc.description.sponsorship逢甲大學,台中市
dc.format.extent7P.
dc.format.extent108166 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries中華民國92年全國計算機會議
dc.subjectStrong password
dc.subjectpassword authentication
dc.subjectstolen-verifier attack
dc.subjectreplay attack
dc.subjectdenial-of-service attack
dc.subject.other資訊安全
dc.titleReplay and Denial-of-Service Attacks on a New Strong-Password Authentication Scheme
分類:2003年 NCS 全國計算機會議

文件中的檔案:
檔案 描述 大小格式 
IS_0032003158.pdf105.63 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。