• No results found

[PDF] Top 20 On the (in)security of some smart-card-based password authentication schemes for WSN

Has 10000 "On the (in)security of some smart-card-based password authentication schemes for WSN" found on our website. Below are the top 20 most common "On the (in)security of some smart-card-based password authentication schemes for WSN".

On  the (in)security  of  some  smart-card-based  password  authentication  schemes  for  WSN

On the (in)security of some smart-card-based password authentication schemes for WSN

... the password change phase and the registration phase, and they are usually apt to choose passwords that are related to their personal life [12], such as meaningful dates, phone numbers or license plate ...although ... See full document

12

On  the  Security  of  `An  Efficient  Biometric  Authentication  Protocol  for  Wireless  Sensor  Networks'

On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'

... user authentication problem in WSNs as fol- ...real-time based and the users (called the external parties) usually want to access the real-time data from the nodes inside WSNs ...user authentication ... See full document

9

An Improved Authentication Protocol for Hierarchical Wireless Sensor Networks using ECC

An Improved Authentication Protocol for Hierarchical Wireless Sensor Networks using ECC

... user authentication scheme in wireless sensor network is difficult ...PKC based on elliptic curve cryptography is feasible in case of wireless sensor network [2], ...is based on integer factorization ... See full document

8

Session Key Based Password Authentication

Session Key Based Password Authentication

... many smart-card-based password authentication schemes have been proposed, and various security goals and properties have been addressed, including (but are not limited to) ... See full document

12

Index Terms: Password, Two Factor Authentication & Smart Card

Index Terms: Password, Two Factor Authentication & Smart Card

... no password-related table on the server is highly appealing when considering the unending catastrophic leakages of millions of user accounts in prominent service providers and the prevalence of zero-day attacks ... See full document

6

Improvement of a Security Enhanced One time Mutual Authentication and Key Agreement Scheme

Improvement of a Security Enhanced One time Mutual Authentication and Key Agreement Scheme

... hash-based authentication methods is Lamport's hash-chain method that introduced in 1981 ...Although authentication methods based on Lamport schema are simple, it requires multiple hashing ... See full document

6

An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

... User authentication is the essential security mechanism for remote login systems in which a password-based au- thentication scheme is the most commonly used tech- nique to provide ... See full document

12

Password  Protected  Smart  Card   and  Memory  Stick  Authentication   Against  Off-line  Dictionary  Attacks

Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks

... the security requirements for remote authentication with password protected smart ...for password-based au- thenticated key exchange have been ...of password based ... See full document

14

On the Security Enhancement of Integrated Electronic Patient Records Information Systems

On the Security Enhancement of Integrated Electronic Patient Records Information Systems

... many smart card based authentica- tion schemes using password have been designed [1, 7, 11, 12, 14–17, 19, ...his password of his choice to protect security parameters in ... See full document

16

An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card

An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card

... important security properties is perfect forward ...scheme security depends on encryption key K = h (ID X mod ...login/ authentication process between user and ...user‟s password PWi is ... See full document

7

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

... user authentication schemes proposed in literature for preventing unauthorized parties from accessing resources in an insecure ...are based on smart card authentication ...secure ... See full document

7

A Secure SCAM (Smart Card based Authentication Mechanism)

A Secure SCAM (Smart Card based Authentication Mechanism)

... ID authentication scheme using smart ...provides security against several potential ...has security vulnerabilities under the assumption that no one can extract data from tamper resistant ... See full document

6

A Comparative Study of Pin Based and Three Factor based Authentication Technique for Improved ATM Security

A Comparative Study of Pin Based and Three Factor based Authentication Technique for Improved ATM Security

... like smart watches, smart phones, rings, necklaces, and bracelets and select a suitable security level for ...hides password entry on screen was presented by ... See full document

6

On  the  Security  of  an  Improved  Password  Authentication  Scheme  Based  on  ECC

On the Security of an Improved Password Authentication Scheme Based on ECC

... types, password authentication is one of the most simple and effec- tive approaches for authentication in a client/server environment, and has been widely deployed in areas like e-banking, e-commerce, ... See full document

9

Robust  Smart  Card  based  Password  Authentication  Scheme  against  Smart  Card  Security  Breach

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

... two-factor authentication mechanism, smart card based password authentication has been a subject of intensive research in the past decade and hundreds of this type of ... See full document

35

SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY

SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY

... a smart card based authentication and key agreement scheme preserving the user anonymity was proposed by Wang, Juang and Lei, that is designed to provide users with secure activities in ... See full document

6

Cryptanalysis  on  `Robust  Biometrics-Based  Authentication  Scheme  for  Multi-server  Environment'

Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment'

... seminal authentication scheme in 1981 [26], several two-party authentication schemes have been proposed in the literature (for example, ...two-party authentication methods in a single server ... See full document

11

An Efficient Password Based Authentication Scheme Using Time Hash Function and Smart Card

An Efficient Password Based Authentication Scheme Using Time Hash Function and Smart Card

... RSA–Based Password Authentication Schemes b) ElGamal–Based Password Authentication Schemes c) Hash–Based Password Authentication Schemes ... See full document

7

A Novel Smart Card based Remote User Authentication Mechanism

A Novel Smart Card based Remote User Authentication Mechanism

... user authentication schemes that use biometrics, passwords and smart ...these schemes however have a number of limitations that render them inadequate to be used as authentication ... See full document

5

Efficient Two-Factor Authentication Protocol Using Password and Smart Card

Efficient Two-Factor Authentication Protocol Using Password and Smart Card

... two-factor authentication based password and smart card to overcome the pitfalls of Lamport’s ...numerous smart card based password authentication ... See full document

7

Show all 10000 documents...