A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
The intent of this paper is to review some timestampbased password authentication schemes using smart cards which have similar working principles. Many of the proposed timestampbased password authentication schemes were subsequently found to be insecure. Here, we investigate three schemes with simil...
| Main Author: | Pathan, Al-Sakib Khan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Kohat University of Science and Technology (KUST), Pakistan
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/802/ http://irep.iium.edu.my/802/1/5653-19903-1-PB.pdf |
Similar Items
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Online authentication using smart card technology in mobile phone infrastructure
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Denial of service in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Security management in heterogeneous distributed sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
PC sound card based instrumentation and control
by: Gunawan, Teddy Surya
Published: (2011)
by: Gunawan, Teddy Surya
Published: (2011)
Power supply interference in smart sensor microcontroller interface
by: Tijani, Ismaila, et al.
Published: (2011)
by: Tijani, Ismaila, et al.
Published: (2011)
Adaptive digital watermarking system for authentication of intellectual properties
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
A practical and interactive web-based software for online Qur’anic Arabic learning
by: Abdullah, Matin Saad, et al.
Published: (2017)
by: Abdullah, Matin Saad, et al.
Published: (2017)
Secure Group Association Management in Heterogeneous Distributed Sensor Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Power supply power-supply interference in smart sensors-to-microntroller interface for biomedical signals
by: Ashraful, Muhammad, et al.
Published: (2011)
by: Ashraful, Muhammad, et al.
Published: (2011)
Blood vein detection system for SmartPhone
by: Ahmed, Kazi Istiaque, et al.
Published: (2018)
by: Ahmed, Kazi Istiaque, et al.
Published: (2018)
An overview of multiplexing schemes for MIMO channel sounding
by: Sharif, Md. Raihan, et al.
Published: (2011)
by: Sharif, Md. Raihan, et al.
Published: (2011)
A QoS awareness scheme sustaining seamless
handover for network mobility
by: Hussien, Loay Faisal, et al.
Published: (2014)
by: Hussien, Loay Faisal, et al.
Published: (2014)
Cost investigation of multihoming-based scheme
to support mobility management in NEMO
by: Islam, Shayla, et al.
Published: (2016)
by: Islam, Shayla, et al.
Published: (2016)
An ingenious multiple communicator concept for next generation smart metering communication system
by: Hashim, Wahidah, et al.
Published: (2016)
by: Hashim, Wahidah, et al.
Published: (2016)
A critique of energy-efficient geographic routing schemes in wireless sensor networks
by: Salami, Abdulazeez F., et al.
Published: (2011)
by: Salami, Abdulazeez F., et al.
Published: (2011)
A novel multihoming-based flow mobility scheme to support mobility management in NEMO
by: Islam, Shayla, et al.
Published: (2014)
by: Islam, Shayla, et al.
Published: (2014)
A comprehensive study of closed-loop power control schemes in CDMA communication system
by: Sharif, Md. Raihan, et al.
Published: (2011)
by: Sharif, Md. Raihan, et al.
Published: (2011)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Generalized discrete fourier transform based improvement of partial transmit sequence scheme to reduce PAPR in OFDM systems
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2015)
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2015)
Overview on fingerprinting authentication technology
by: Sulaiman, Nadzril, et al.
Published: (2020)
by: Sulaiman, Nadzril, et al.
Published: (2020)
Performance improvement of sensors response using piece-wise non-linear (PWL) A/D and pulse-width modulation (PWM) A/D techniques
by: Tijani, Ismaila, et al.
Published: (2011)
by: Tijani, Ismaila, et al.
Published: (2011)
Sensor and sensor response-issues and interfacing
by: Ahmmad, Syed Masrur, et al.
Published: (2011)
by: Ahmmad, Syed Masrur, et al.
Published: (2011)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Fast UWB wireless connectivity for MIMO multi-user
by: Mohammed, Ahmed R., et al.
Published: (2013)
by: Mohammed, Ahmed R., et al.
Published: (2013)
Application of UWB wireless MIMO connectivity inside modern aircraft
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2016)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2016)
Efficient cache replacement policy for minimizing error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Human path detection : a review
by: Khan, Imran Moez, et al.
Published: (2011)
by: Khan, Imran Moez, et al.
Published: (2011)
Design of differential resistive measuring system and its applications
by: Abdul Wahab, Deji, et al.
Published: (2011)
by: Abdul Wahab, Deji, et al.
Published: (2011)
Linearizing techniques for sensor output
by: Saddiqi, Mohammad Tahir, et al.
Published: (2011)
by: Saddiqi, Mohammad Tahir, et al.
Published: (2011)
Response and inaccuracy issues of sensors
by: Ashraful, Muhammad, et al.
Published: (2011)
by: Ashraful, Muhammad, et al.
Published: (2011)
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020)
by: Alquwatli, Mohammed H., et al.
Published: (2020)
A novel and efficient bilateral remote user authentication
scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Analysis and implementation for a walking support system for
visually impaired people
by: Hossain , Eklas, et al.
Published: (2011)
by: Hossain , Eklas, et al.
Published: (2011)
RLC circuit response
by: Tasnim, Rumana, et al.
Published: (2011)
by: Tasnim, Rumana, et al.
Published: (2011)
Similar Items
-
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007) -
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006) -
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008) -
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008) -
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)