کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
9506348 1340748 2005 13 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Authentication schemes with no verification table
موضوعات مرتبط
مهندسی و علوم پایه ریاضیات ریاضیات کاربردی
پیش نمایش صفحه اول مقاله
Authentication schemes with no verification table
چکیده انگلیسی
In 2000, Hwang and Yeh presented an improved version of Peyravian and Zunic's scheme by using the server's public key. In 2003, Lin and Hwang indicated that Hwang and Yeh's scheme suffers from the denial-of-service attack and proposed a password authentication scheme with secure password updating. However, the verification table needed in both Hwang and Yeh's and Lin and Hwang's schemes makes these schemes vulnerable to the stolen-verifier attack. To overcome their drawback, we propose two authentication schemes with no verification table in this paper.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Applied Mathematics and Computation - Volume 167, Issue 2, 15 August 2005, Pages 820-832
نویسندگان
, ,