完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Horng, Wen-Bing Jr | |
dc.contributor.author | Lee, Cheng-Ping Jr | |
dc.contributor.author | Peng, Jian-Wen Jr | |
dc.date.accessioned | 2011-01-10T02:18:09Z | |
dc.date.accessioned | 2020-05-18T03:10:53Z | - |
dc.date.available | 2011-01-10T02:18:09Z | |
dc.date.available | 2020-05-18T03:10:53Z | - |
dc.date.issued | 2011-01-10T02:18:09Z | |
dc.date.submitted | 2010-12-16 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/29878 | - |
dc.description.abstract | Recently, Kim and Chung proposed a more secure remote user authentication scheme, which is an improvement over Yoon-Yoo’s scheme to remedy their security flaws, such as leak of password and vulnerabilities to the masquerading user attack, the masquerading server attack, and the stolen-verifier attack. In this paper, we will show that Kim-Chung’s improved scheme is vulnerable to the offline password guessing attack. In addition, the scheme does not possess the feature of secret key forward secrecy as they claimed. Hence, Kim-Chung’s scheme is also subject to the masquerading user attack and the masquerading server attack as well. Moreover, their scheme does not generate session keys for secure communications. | |
dc.description.sponsorship | National Cheng Kung University,Tainan | |
dc.format.extent | 4p. | |
dc.relation.ispartofseries | 2010 ICS會議 | |
dc.subject | authentication | |
dc.subject | network security | |
dc.subject | smart card | |
dc.subject.other | Information Security | |
dc.title | Cryptanalysis of a More Secure Remote User Authentication Scheme | |
分類: | 2010年 ICS 國際計算機會議(如需查看全文,請連結至IEEE Xplore網站) |
文件中的檔案:
沒有與此文件相關的檔案。
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。