Remote user authentication has been framed to provide security to the users by hiding their details with the help of some technique which can bear all the forgery attacks, but not reveal any details. All the users want CIA (confidentiality, integrity, and availability) to be there if they are working in a network. Various protocols have been proposed and implemented in literature. But the efficient tool is still lacking. Here we find that many of the schemes and protocols suggested are vulnerable to forgery attacks. We have found some problems in secure remote user authentication scheme based on smart card.
CITATION STYLE
Soni, M., Patel, T., & Jain, A. (2020). Security Analysis on Remote User Authentication Methods. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 31, pp. 506–513). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-24643-3_60
Mendeley helps you to discover research relevant for your work.