Smart card based user authentication scheme with anonymity

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Mobile devices (e.g., PDA, mobile phone, tablet, and notebook PC) become necessary for a convenient and modern life. So, we can use them to access services, for examples online shopping, internet banking. In such insecure environment, we see that communications are more and more essential because they defend users and providers against illegitimate adversaries. Recently, Shin et al have proposed scientific paper entitled’A Remote User Authentication Scheme with Anonymity for Mobile Devices’ to enhance security for remote user authentication. They claimed that their scheme is truly more secure than previous ones and it can resist various attacks. However, it is not true because their scheme’s vulnerable to insider, impersonation and replay attacks. In this paper, we present an improvement to their scheme to isolate such problems.

Cite

CITATION STYLE

APA

Truong, T. T., Tran, M. T., & Duong, A. D. (2014). Smart card based user authentication scheme with anonymity. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8860, 220–233. https://doi.org/10.1007/978-3-319-12778-1_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free