The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The dynamic identity based authentication was a worth researching issue in the mutual authentication. In 2011, Sood et al. proposed a secure dynamic identity based authentication protocol for multi-server architecture to improve Hsiang and Shih's protocol. However, we find that Sood et al.'s scheme lacks of the authentication between server and user. In this paper, we propose an improved scheme to...
Recently, Chen et al. proposed an anonymous authentication scheme for mobile pay-TV, they claim that their scheme can defend against reply attacks, off-line password guessing attacks, impersonation attack, forgery attack, man-in-the-middle attack, and insider attack. In this paper, we show that Chen et al.'s scheme is still vulnerable to off-line password guessing attacks and fails provide mutual...
Recently, Wang et al. showed that Das et al.'s dynamic ID-based remote user authentication scheme is vulnerable to an impersonation attack and can not achieve mutual authentication. Consequently, a more efficient and secure dynamic ID-based remote user authentication scheme was proposed and claimed that it was now secure and of practical value. However, in this paper, we will show that Wang et al...
In 2008, Yoon et al. [25] presented three kinds of security attacks (YLY attacks for short) of a user authentication and key agreement scheme using smart cards in different scenarios. The YLY attacks are: perfect forward secrecy, the guessing attack, and the Denning-Sacco attack. The main goal of this paper is to propose a robust remote user authentication scheme using smart card that could not only...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.