A family (tree) of 2-party password-based authentication protocols based on smart cards abounds in security literature, more popularly known as remote user authentication schemes using smart cards. In this paper, we give a generic treatment to the security and analyses of such protocols, tracing back to the original versions due to Hwang et al. and Hwang-Li from which many variants have been derived. Our work here highlights the security implications of taking the break-and-tweak approach to protocol design. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Phan, R. C. W., & Goi, B. M. (2007). On the analysis and design of a family tree of smart card based user authentication schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4611 LNCS, pp. 1213–1221). Springer Verlag. https://doi.org/10.1007/978-3-540-73549-6_118
Mendeley helps you to discover research relevant for your work.