完整後設資料紀錄
DC 欄位語言
dc.contributor.authorHorng, Wen-Bing Jr
dc.contributor.authorLee, Cheng-Ping Jr
dc.contributor.authorPeng, Jian-Wen Jr
dc.date.accessioned2011-01-10T02:18:09Z
dc.date.accessioned2020-05-18T03:10:53Z-
dc.date.available2011-01-10T02:18:09Z
dc.date.available2020-05-18T03:10:53Z-
dc.date.issued2011-01-10T02:18:09Z
dc.date.submitted2010-12-16
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/29878-
dc.description.abstractRecently, Kim and Chung proposed a more secure remote user authentication scheme, which is an improvement over Yoon-Yoo’s scheme to remedy their security flaws, such as leak of password and vulnerabilities to the masquerading user attack, the masquerading server attack, and the stolen-verifier attack. In this paper, we will show that Kim-Chung’s improved scheme is vulnerable to the offline password guessing attack. In addition, the scheme does not possess the feature of secret key forward secrecy as they claimed. Hence, Kim-Chung’s scheme is also subject to the masquerading user attack and the masquerading server attack as well. Moreover, their scheme does not generate session keys for secure communications.
dc.description.sponsorshipNational Cheng Kung University,Tainan
dc.format.extent4p.
dc.relation.ispartofseries2010 ICS會議
dc.subjectauthentication
dc.subjectnetwork security
dc.subjectsmart card
dc.subject.otherInformation Security
dc.titleCryptanalysis of a More Secure Remote User Authentication Scheme
分類:2010年 ICS 國際計算機會議(如需查看全文,請連結至IEEE Xplore網站)

文件中的檔案:
沒有與此文件相關的檔案。


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。