-
Chapter and Conference Paper
Cryptanalysis and Improvement of Sood et al.’s Dynamic ID-Based Authentication Scheme
Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Recently, Sood et al. showed that Wang et al.’s dynamic ID-based remote user authentication scheme fails ...
-
Chapter and Conference Paper
Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing
The design of secure remote user authentication schemes for mobile devices in Cloud Computing is still an open and quite challenging problem, though many such schemes have been published lately. Recently, Chen...
-
Chapter and Conference Paper
Breaking a Robust Remote User Authentication Scheme Using Smart Cards
Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. Recently, Yeh et al. showed that Hsiang and Shih’s password-based remote ...
-
Chapter and Conference Paper
A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy
Forward secrecy is one of the important properties of remote user authentication schemes to limit the effects of eventual failure of the entire system when the long-term private keys of one or more parties are...