Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Cryptanalysis and Improvement of Sood et al.’s Dynamic ID-Based Authentication Scheme

    Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Recently, Sood et al. showed that Wang et al.’s dynamic ID-based remote user authentication scheme fails ...

    Chun-Guang Ma, Ding Wang, Qi-Ming Zhang in Distributed Computing and Internet Technology (2012)

  2. No Access

    Chapter and Conference Paper

    On the Security of an Improved Password Authentication Scheme Based on ECC

    The design of secure remote user authentication schemes for mobile applications is still an open and quite challenging problem, though many schemes have been published lately. Recently, Islam and Biswas pointe...

    Ding Wang, Chun-guang Ma, Lan Shi, Yu-heng Wang in Information Computing and Applications (2012)

  3. Chapter and Conference Paper

    Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

    In DBSec’11, Li et al. showed that Kim and Chung’s password-based remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an improved version...

    Ding Wang, Chun-guang Ma, Peng Wu in Data and Applications Security and Privacy XXVI (2012)

  4. Chapter and Conference Paper

    Breaking a Robust Remote User Authentication Scheme Using Smart Cards

    Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. Recently, Yeh et al. showed that Hsiang and Shih’s password-based remote ...

    Ding Wang, Chun-guang Ma, Sen-dong Zhao, Chang-li Zhou in Network and Parallel Computing (2012)

  5. No Access

    Chapter and Conference Paper

    Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture

    In NSS’10, Shao and Chin pointed out that Hsiang and Shih’s dynamic ID-based remote user authentication scheme for multi-server environment has several security flaws and further proposed an improved version w...

    Ding Wang, Chun-guang Ma, De-li Gu, Zhen-shan Cui in Network and System Security (2012)

  6. No Access

    Chapter and Conference Paper

    A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy

    Forward secrecy is one of the important properties of remote user authentication schemes to limit the effects of eventual failure of the entire system when the long-term private keys of one or more parties are...

    Chun-Guang Ma, Ding Wang, ** Zhao, Yu-Heng Wang in Web Technologies and Applications (2012)