On the analysis and design of a family tree of smart card based user authentication schemes

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A family (tree) of 2-party password-based authentication protocols based on smart cards abounds in security literature, more popularly known as remote user authentication schemes using smart cards. In this paper, we give a generic treatment to the security and analyses of such protocols, tracing back to the original versions due to Hwang et al. and Hwang-Li from which many variants have been derived. Our work here highlights the security implications of taking the break-and-tweak approach to protocol design. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Phan, R. C. W., & Goi, B. M. (2007). On the analysis and design of a family tree of smart card based user authentication schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4611 LNCS, pp. 1213–1221). Springer Verlag. https://doi.org/10.1007/978-3-540-73549-6_118

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free