19
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references36

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            An improved smart card based password authentication scheme with provable security

              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              A Dynamic ID-based Remote User Authentication Scheme

              Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based remote user authentication schemes both with and without smart cards have been proposed. Most of the schemes do not allow the users to choose and change their passwords, and maintain a verifier table to verify the validity of the user login. In this paper we present a dynamic ID-based remote user authentication scheme using smart cards. Our scheme allows the users to choose and change their passwords freely, and do not maintain any verifier table. The scheme is secure against ID-theft, and can resist the reply attacks, forgery attacks, guessing attacks, insider attacks and stolen verifier attacks.
                Bookmark

                Author and article information

                Journal
                IEEE Transactions on Dependable and Secure Computing
                IEEE Trans. Dependable and Secure Comput.
                Institute of Electrical and Electronics Engineers (IEEE)
                1545-5971
                July 1 2015
                July 1 2015
                : 12
                : 4
                : 428-442
                Article
                10.1109/TDSC.2014.2355850
                a75158ee-88be-4046-b154-ef1b2818d03c
                © 2015
                History

                Comments

                Comment on this article