In 2012, Kim et al. analyzed Martinez-Pelaez et al.'s dynamic IDbased remote user authentication scheme with session key agreement for multiserver environment. They described that Martinez-Pelaez et al.'s scheme is vulnerable to masquerade attack, server spoofing attack, stolen smart card attack, and is not easily repairable. In this paper, we show how to solve the vulnerabilities in Martinez-Pelaez et al.'s scheme. © 2012 Springer-Verlag.
CITATION STYLE
Kim, M., Park, N., & Won, D. (2012). Security improvement on a dynamic ID-based remote user authentication scheme with session key agreement for multi-server environment. In Communications in Computer and Information Science (Vol. 339 CCIS, pp. 122–127). https://doi.org/10.1007/978-3-642-35264-5_17
Mendeley helps you to discover research relevant for your work.