A security enhanced timestamp-based password authentication scheme using smart cards
The intent of this letter is to propose an efficient timestamp based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et al.’s timestamp-based password authentication scheme and improve their scheme to ensure robust security for the remote authe...
| Main Authors: | Pathan, Al-Sakib Khan, Hong, Choong Seon |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
The Institute of Electronics, Information and Communication Engineers, Japan
2007
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/786/ http://irep.iium.edu.my/786/1/A_Security_Enhanced_Timestamp-Based_Password_Authentication_Scheme_Using_Smart_Cards.pdf |
Similar Items
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Secure Group Association Management in Heterogeneous Distributed Sensor Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Online authentication using smart card technology in mobile phone infrastructure
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Security management in heterogeneous distributed sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Denial of service in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
PC sound card based instrumentation and control
by: Gunawan, Teddy Surya
Published: (2011)
by: Gunawan, Teddy Surya
Published: (2011)
A novel and efficient bilateral remote user authentication
scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Power supply interference in smart sensor microcontroller interface
by: Tijani, Ismaila, et al.
Published: (2011)
by: Tijani, Ismaila, et al.
Published: (2011)
Adaptive digital watermarking system for authentication of intellectual properties
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
Power supply power-supply interference in smart sensors-to-microntroller interface for biomedical signals
by: Ashraful, Muhammad, et al.
Published: (2011)
by: Ashraful, Muhammad, et al.
Published: (2011)
A practical and interactive web-based software for online Qur’anic Arabic learning
by: Abdullah, Matin Saad, et al.
Published: (2017)
by: Abdullah, Matin Saad, et al.
Published: (2017)
Blood vein detection system for SmartPhone
by: Ahmed, Kazi Istiaque, et al.
Published: (2018)
by: Ahmed, Kazi Istiaque, et al.
Published: (2018)
An overview of multiplexing schemes for MIMO channel sounding
by: Sharif, Md. Raihan, et al.
Published: (2011)
by: Sharif, Md. Raihan, et al.
Published: (2011)
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016)
by: Khan, Burhan ul Islam, et al.
Published: (2016)
A QoS awareness scheme sustaining seamless
handover for network mobility
by: Hussien, Loay Faisal, et al.
Published: (2014)
by: Hussien, Loay Faisal, et al.
Published: (2014)
Cost investigation of multihoming-based scheme
to support mobility management in NEMO
by: Islam, Shayla, et al.
Published: (2016)
by: Islam, Shayla, et al.
Published: (2016)
An ingenious multiple communicator concept for next generation smart metering communication system
by: Hashim, Wahidah, et al.
Published: (2016)
by: Hashim, Wahidah, et al.
Published: (2016)
A critique of energy-efficient geographic routing schemes in wireless sensor networks
by: Salami, Abdulazeez F., et al.
Published: (2011)
by: Salami, Abdulazeez F., et al.
Published: (2011)
A novel multihoming-based flow mobility scheme to support mobility management in NEMO
by: Islam, Shayla, et al.
Published: (2014)
by: Islam, Shayla, et al.
Published: (2014)
A comprehensive study of closed-loop power control schemes in CDMA communication system
by: Sharif, Md. Raihan, et al.
Published: (2011)
by: Sharif, Md. Raihan, et al.
Published: (2011)
Generalized discrete fourier transform based improvement of partial transmit sequence scheme to reduce PAPR in OFDM systems
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2015)
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2015)
Overview on fingerprinting authentication technology
by: Sulaiman, Nadzril, et al.
Published: (2020)
by: Sulaiman, Nadzril, et al.
Published: (2020)
Performance improvement of sensors response using piece-wise non-linear (PWL) A/D and pulse-width modulation (PWM) A/D techniques
by: Tijani, Ismaila, et al.
Published: (2011)
by: Tijani, Ismaila, et al.
Published: (2011)
Sensor and sensor response-issues and interfacing
by: Ahmmad, Syed Masrur, et al.
Published: (2011)
by: Ahmmad, Syed Masrur, et al.
Published: (2011)
Efficient cache replacement policy for minimizing error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Human path detection : a review
by: Khan, Imran Moez, et al.
Published: (2011)
by: Khan, Imran Moez, et al.
Published: (2011)
Design of differential resistive measuring system and its applications
by: Abdul Wahab, Deji, et al.
Published: (2011)
by: Abdul Wahab, Deji, et al.
Published: (2011)
Linearizing techniques for sensor output
by: Saddiqi, Mohammad Tahir, et al.
Published: (2011)
by: Saddiqi, Mohammad Tahir, et al.
Published: (2011)
Response and inaccuracy issues of sensors
by: Ashraful, Muhammad, et al.
Published: (2011)
by: Ashraful, Muhammad, et al.
Published: (2011)
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020)
by: Alquwatli, Mohammed H., et al.
Published: (2020)
Analysis and implementation for a walking support system for
visually impaired people
by: Hossain , Eklas, et al.
Published: (2011)
by: Hossain , Eklas, et al.
Published: (2011)
RLC circuit response
by: Tasnim, Rumana, et al.
Published: (2011)
by: Tasnim, Rumana, et al.
Published: (2011)
Spikes blocking and surge protection
by: Torla, Ahmad Lutfi, et al.
Published: (2011)
by: Torla, Ahmad Lutfi, et al.
Published: (2011)
Similar Items
-
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
by: Pathan, Al-Sakib Khan
Published: (2010) -
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006) -
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007) -
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006) -
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)