Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Cryptanalysis and Improvement of Sood et al.’s Dynamic ID-Based Authentication Scheme

    Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Recently, Sood et al. showed that Wang et al.’s dynamic ID-based remote user authentication scheme fails ...

    Chun-Guang Ma, Ding Wang, Qi-Ming Zhang in Distributed Computing and Internet Technology (2012)

  2. Chapter and Conference Paper

    Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

    In DBSec’11, Li et al. showed that Kim and Chung’s password-based remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an improved version...

    Ding Wang, Chun-guang Ma, Peng Wu in Data and Applications Security and Privacy XXVI (2012)

  3. No Access

    Chapter and Conference Paper

    Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture

    In NSS’10, Shao and Chin pointed out that Hsiang and Shih’s dynamic ID-based remote user authentication scheme for multi-server environment has several security flaws and further proposed an improved version w...

    Ding Wang, Chun-guang Ma, De-li Gu, Zhen-shan Cui in Network and System Security (2012)