Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Cryptanalysis and Improvement of Sood et al.’s Dynamic ID-Based Authentication Scheme

    Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Recently, Sood et al. showed that Wang et al.’s dynamic ID-based remote user authentication scheme fails ...

    Chun-Guang Ma, Ding Wang, Qi-Ming Zhang in Distributed Computing and Internet Technology (2012)

  2. No Access

    Chapter and Conference Paper

    Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing

    The design of secure remote user authentication schemes for mobile devices in Cloud Computing is still an open and quite challenging problem, though many such schemes have been published lately. Recently, Chen...

    Ding Wang, Ying Mei, Chun-guang Ma, Zhen-shan Cui in Web Information Systems and Mining (2012)

  3. No Access

    Chapter and Conference Paper

    A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy

    Forward secrecy is one of the important properties of remote user authentication schemes to limit the effects of eventual failure of the entire system when the long-term private keys of one or more parties are...

    Chun-Guang Ma, Ding Wang, ** Zhao, Yu-Heng Wang in Web Technologies and Applications (2012)