-
Chapter and Conference Paper
Cryptanalysis and Improvement of Sood et al.’s Dynamic ID-Based Authentication Scheme
Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Recently, Sood et al. showed that Wang et al.’s dynamic ID-based remote user authentication scheme fails ...
-
Chapter and Conference Paper
Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing
The design of secure remote user authentication schemes for mobile devices in Cloud Computing is still an open and quite challenging problem, though many such schemes have been published lately. Recently, Chen...
-
Chapter and Conference Paper
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards
In DBSec’11, Li et al. showed that Kim and Chung’s password-based remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an improved version...
-
Chapter and Conference Paper
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture
In NSS’10, Shao and Chin pointed out that Hsiang and Shih’s dynamic ID-based remote user authentication scheme for multi-server environment has several security flaws and further proposed an improved version w...