Security Analysis on Remote User Authentication Methods

19Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Remote user authentication has been framed to provide security to the users by hiding their details with the help of some technique which can bear all the forgery attacks, but not reveal any details. All the users want CIA (confidentiality, integrity, and availability) to be there if they are working in a network. Various protocols have been proposed and implemented in literature. But the efficient tool is still lacking. Here we find that many of the schemes and protocols suggested are vulnerable to forgery attacks. We have found some problems in secure remote user authentication scheme based on smart card.

Cite

CITATION STYLE

APA

Soni, M., Patel, T., & Jain, A. (2020). Security Analysis on Remote User Authentication Methods. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 31, pp. 506–513). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-24643-3_60

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free