搜索结果: 1-15 共查到“军队指挥学 User authentication”相关记录29条 . 查询时间(0.137 秒)
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Lattice-Based Cryptography Fuzzy Signatures Biometrics Reusability
2019/6/26
In this paper, we introduce a new construction of lattice-based reusable fuzzy signature for remote user authentication that is secure against quantum computers. We define formal security models for t...
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
Internet of Things Wireless Sensor Networks Vulnerability
2017/6/22
Internet of things (IOT) is the term used to describe a world in which the things interact with other things through internet connection or communication means, share the information together and or p...
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
user authentication key agreement cryptanalysis
2016/1/27
Recently, Farasha et al. proposed an efficient user authentication and key
agreement scheme for heterogeneous wireless sensor network tailored for the Internet
of Things environment. By using BAN-lo...
Improved on an improved remote user authentication scheme with key agreement
user authentication key agreement cryptanalysis
2016/1/27
Recently, Kumari et al. pointed out that Chang et al.’s scheme “Untraceable
dynamic-identity-based remote user authentication scheme with verifiable password
update” not only has several drawbacks, ...
Comments on a novel user authentication and key agreement scheme
user authentication key agreement client-server environment
2016/1/25
In 2013, Sun et al. showed that the related works' authentication schemes proposed by
[2-7] are vulnerable to an insider attack and fail to provide mutual authentication.
These two attacks can be su...
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
cryptographic protocols Authentication scheme
2016/1/9
A three-factor authentication combines biometrics information with user password and smart card to provide security-enhanced user authentication. An proposed user authentication scheme improved Das’s ...
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System
Cryptographic secret keys Das’s scheme
2016/1/9
Password-based authentication schemes are convenient, but vulnerable to simple dictionary attacks. Cryptographic secret keys are safe, but difficult to memorize. More recently, biometric information h...
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
Cryptanalysis Remote User Authentication Key Agreement
2015/12/30
In 2012, Wen and Li proposed a secure and robust dynamic identity based remote user authentication
scheme with key agreement using smart cards. They claimed that their scheme is efficient
and secure...
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Discrete logarithm problem Fingerprinting Hash functions
2015/12/29
In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common sessio...
Cryptanalysis of a Markov Chain Based User Authentication Scheme
Security Attacks Markov Chain Authentication Protocol
2015/12/29
Session key agreement protocol using smart card is extremely popular in clientserver
environment for secure communication. Remote user authentication protocol plays a
crucial role in our daily life ...
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Biometrics user authentication smart cards security
2012/6/14
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, desi...
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Biometrics user authentication smart cards security
2012/3/20
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, desi...
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Biometrics user authentication smart cards security
2012/8/28
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, desi...
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards
cryptographic protocols / Authentication smart cards dynamic ID multi-server system password attack
2012/3/28
The security of a dynamic ID-based remote user authentication scheme for multi-server environment using smart cards proposed by Lee et al. [Lee, C-C., Lin, T-H., Chang, R-X., A Secure Dynamic ID based...
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards
cryptographic protocols / Authentication smart cards dynamic ID multi-server system password attack
2011/6/8
The security of a dynamic ID-based remote user authentication scheme for multi-server environment using smart cards proposed by Lee et al. [Lee, C-C., Lin, T-H., Chang, R-X., A Secure Dynamic ID based...