Two-factor mutual authentication based on smart cards and passwords
نویسندگان
چکیده
منابع مشابه
Mutual Authentication with Smart Cards
The World Wide Web has become the de facto interface for consumer oriented electronic commerce. So far the interaction between consumers and merchants is mostly limited to providing information about products and credit card based payments for mail orders. This is largely due to the lack of security currently available for commercial transactions. At the moment the only security mechanism prese...
متن کاملPairing based Mutual Authentication Scheme Using Smart Cards
Bilinear pairings based mutual authentication scheme using smart card is presented. We propose a novel technique of using two different servers, one for registration and other for authentication. The scheme is resilient to replay, forgery, man-in-the-middle and insider attacks.
متن کاملAuthenticating Passwords Remotely Using Smart Cards
In 2000, Sun proposed a user authentication scheme without using a password table but the user’s password is assigned by the server. Due to this reason, Wu and Chieu proposed an improved scheme to overcome the drawback in 2003. Their scheme provides users to choose and change passwords freely. However, Yang and Wang has presented the possible attacks on Wu-Chieu scheme in 2004. In this article,...
متن کاملChaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications
Mobile users can roam into foreign networks and transmit messages to foreign agents, and they can access the services provided by a foreign agent by using their mobile devices. Thus, mobile user authentication and key agreement for wireless communications are becoming more and more important. In recent years, most of the existing user authentication and key-agreement protocols with smart cards ...
متن کاملAdapting a Novel Dual Authentication Method based on Smart Cards
In this paper, adapting a novel dual authentication method based on smart cards in public networks is proposed. This method uses the ElGamal public key cryptosystem and extend Chaum–van Antwerpen’s scheme to authenticate a signature between the signer and verifier using a dual protocol with a smart card that has tamper-resistant features. We propose the method to change the verification and dis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer and System Sciences
سال: 2008
ISSN: 0022-0000
DOI: 10.1016/j.jcss.2008.04.002