An improvement on remote user authentication schemes using smart cards

5Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.’s schemes are still vulnerable to ID-theft attack, off-line password guessing attacks, undetectable on-line password guessing attacks and user impersonation attack. Notably, problems remain in situations where the user lost a smart card or the malicious legal user. To remedy these flaws, this paper proposes an improvement on Yeh et al.’s remote user authentication schemes using smart cards.

Cite

CITATION STYLE

APA

Chen, C. L., Deng, Y. Y., Tang, Y. W., Chen, J. H., & Lin, Y. F. (2018). An improvement on remote user authentication schemes using smart cards. Computers, 7(1). https://doi.org/10.3390/computers7010009

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free