86
Views
3
CrossRef citations to date
0
Altmetric
Articles

A security enhanced mutual authentication scheme based on nonce and smart cards

&
Pages 1090-1095 | Received 21 Feb 2013, Accepted 14 Jul 2013, Published online: 16 May 2014

References

  • Chan, C. K., and L. M. Cheng. 2002. “Cryptanalysis of Timestamp-based Password Authentication Scheme.” Computers and Security 21 (1): 74–76. doi:10.1016/S0167-4048(02)00110-4.
  • Fan, L., J. H. Li, and H. W. Zhu. 2002. “An Enhancement of Timestamp-based Password Authentication Scheme.” Computers & Security 21 (7): 665–667. doi:10.1016/S0167-4048(02)01118-5.10.1016/S0167-4048(02)01118-5
  • He, D., S. Wu, and J. Chen. 2012. “Note on Design of Improved Password Authentication and Update Scheme Based on Elliptic Curve Cryptography.” Mathematical and Computer Modelling 55 (3–4): 1661–1664. doi:10.1016/j.mcm.2011.10.079.10.1016/j.mcm.2011.10.079
  • Huang, H.-F., S.-E. Liu, and H.-F. Chen. 2013. “Designing a New Mutual Authentication Scheme Based on Nonce and Smart Cards.” Journal of the Chinese Institute of Engineers 36 (1): 98–102. doi:10.1080/02533839.2012.726329.10.1080/02533839.2012.726329
  • Lamport, L. 1981. “Password Authentication with Insecure Communication.” Communications of the ACM 24 (11): 770–772. doi:10.1145/358790.358797.10.1145/358790.358797
  • Leu, J. S., W. H. Lin, and H. J. Tzeng. 2010. “Design and Implementation of a Mobile Home Surveillance System.” Journal of the Chinese Institute of Engineers 33 (5): 669–680. doi:10.1080/02533839.2010.9671656.10.1080/02533839.2010.9671656
  • Liu, J. Y., A. M. Zhou, and M. X. Gao. 2008. “A New Mutual Authentication Scheme Based on Nonce and Smart Cards.” Computer Communications 31 (10): 2205–2209. doi:10.1016/j.comcom.2008.02.002.10.1016/j.comcom.2008.02.002
  • Messerges, T. S., E. A. Dabbish, and R. H. Sloan. 2002. “Examining Smart-card Security under the Threat of Power Analysis Attacks.” IEEE Transactions on Computers 51 (5): 541–552. doi:10.1109/TC.2002.1004593.10.1109/TC.2002.1004593
  • Shen, J. J., C. W. Lin, and M. S. Hwang. 2003. “Security Enhancement for the Timestamp-based Password Authentication Scheme Using Smart Cards.” Computers & Security 22 (7): 591–595. doi:10.1016/S0167-4048(03)00709-0.10.1016/S0167-4048(03)00709-0
  • Sun, D. Z., J. P. Huai, J. Z. Sun, and J. X. Li. 2009. “Cryptanalysis of a Mutual Authentication Scheme Based on Nonce and Smart Cards.” Computer Communications 32 (6): 1015–1017. doi:10.1016/j.comcom.2008.12.023.10.1016/j.comcom.2008.12.023
  • Wang, M., J. Z. Lu, and X. F. Li. 2005. “Remote Password Authentication Scheme Based on Smartcard.” Computer Applications 25 (10): 2289–2290.
  • Yang, W. H., and S. P. Shieh. 1999. “Password Authentication Schemes with Smart Cards.” Computers & Security 18 (8): 727–733. doi:10.1016/S0167-4048(99)80136-9.10.1016/S0167-4048(99)80136-9
  • Yingjie Wang, J., and H. Jianhua Li. 2004. “Security Improvement on a Timestamp-based Password Authentication Scheme.” IEEE Transactions on Consumer Electronics 50 (2): 580–582. doi:10.1109/TCE.2004.1309429.10.1109/TCE.2004.1309429
  • Yoon, E. J., E. K. Ryu, and K. Y. Yoo. 2005. “Attacks on the Shen et al.’s Timestamp-based Password Authentication Scheme Using Smart Cards.” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E88-A (1): 319–321. doi:10.1093/ietfec/E88-A.1.319.10.1093/ietfec/E88-A.1.319
  • Zhou, J., and Y. H. Ou. 2009. “Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme.” Journal of the Chinese Institute of Engineers 32 (7): 967–974. doi:10.1080/02533839.2009.9671584.10.1080/02533839.2009.9671584

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.