Password is one of the simple and efficient methods to protect the transactions in insecure network environments. There are many authors researching in this area to suggest the protocols preventing illegitimate users from accessing the systems. In 2013, Y-H An proposed the scheme to isolate some problems which exist in Khan et al.'s scheme. In this paper, we demonstrate that Y-H An's scheme is vulnerable to server forgery attack and cannot provide user's anonymity. Furthermore, we also propose the modified scheme to overcome these limitations. © Springer-Verlag Berlin Heidelberg 2014.
CITATION STYLE
Truong, T. T., Tran, M. T., & Duong, A. D. (2014). Dynamic identity-based authentication scheme with perfect forward secrecy session key. In Lecture Notes in Electrical Engineering (Vol. 282 LNEE, pp. 339–348). Springer Verlag. https://doi.org/10.1007/978-3-642-41968-3_35
Mendeley helps you to discover research relevant for your work.