A bilateral remote user authentication scheme that preserves user anonymity

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A bilateral remote user authentication scheme that preserves user anonymity

Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme aims to provide more functionalities and to resist well-known attacks. These crucial merits include (1) a user can freely choose and change his passwords; (2) our scheme provides mutual authentication between a server...

متن کامل

Remote User Authentication Scheme with User Anonymity

This paper proposes a scheme allowing a user to log into the server with a dynamic pseudonym. No one can trace the specified user except the service provider, which protects the user privacy from outsiders in this way. Besides, the scheme provides the following merits: (1) no verification table; (2) mutual authentication; (3) low communication and computation cost; (4) free password change; (5)...

متن کامل

Advanced Secure Remote User Authentication Scheme Preserving User Anonymity

To ensure secure transmission of data and to authenticate remote user while accessing server resources, smart card based remote user authentication schemes have been widely adopted. In 2004, Das et al proposed first of its kind of protocol for remote user authentication with smart cards using Dynamic Id to protect user anonymity. In 2005, Chien et al pointed out that Das et al scheme failed to ...

متن کامل

Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity

* Corresponding author Summary Even though user anonymity is an important issue in many ecommerce applications, most of smartcard-based remote authentication schemes did not considered user identities protection while authenticating the users. In 2004, Das et al. proposed a remote authentication scheme by preserving the users' anonymity. Their scheme adopted dynamic identification to achieve th...

متن کامل

A Remote User Authentication Scheme with Anonymity for Mobile Devices

With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e‐commerce. When a remote server provides such e‐commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2008

ISSN: 1939-0114,1939-0122

DOI: 10.1002/sec.26