期刊文献+

对Liao等人身份鉴别方案的分析与改进 被引量:3

Improved remote user authentication scheme
下载PDF
导出
摘要 基于智能卡的身份鉴别是一种双因子鉴别,被广泛应用于鉴别远程用户的身份。2006年,Liao等人提出了一种基于智能卡的身份鉴别方案。在目前身份鉴别研究的基础上,分析指出了Liao等人方案存在的安全漏洞,并对方案作了改进,改进后的方案不仅保持了Liao等人方案的优点,而且极大地增强了系统的高效性、安全性和实用性。 Smart card-based authentication is a two-factor authentication mechanism,which is widely used for remote user aubentication.In 2006,Liao et al proposed a smart card-based authentication.Based on the modern studies,the safety flaws of Liao it al's program are pointed out.And then an improved authentication scheme based on smart card is proposed.The improved program ,ot only maintains the advantages of the Liao et al's program,but also performs better among efficiency,security and flexibility.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第4期110-112,共3页 Computer Engineering and Applications
关键词 身份鉴别 双因子 安全漏洞 authentication two-factor safety flaws
  • 相关文献

参考文献8

  • 1斯伦贝谢公司智能卡事业部OuvlerPiou.面向电子化未来的智能卡[EB/OL].http://www.caw.com.cn/issues/2000/4714720.asp.
  • 2Yang W H,Shieh S P.Password authentication scheme with smart cards[J].Computers & Security, 1999,18(8) :727-733.
  • 3Fan L,Li J H,Zhu H W.An enhancement of timestamp based password authentication scheme[J].Computers & Security, 2002,21 ( 7 ) : 665-667.
  • 4Shen J J,Lin C W,Hwang M S.Security enhancement for the time- stamp based password authentication scheme using smart cards[J]. Computers & Security, 2003,22(7).
  • 5Lee N Y,Chiu Y C.Improved remote authentication scheme with smart card[J].Computer Standards & Interfaces,2005,27(2):177-180.
  • 6Wu S T,Chieu B C.A note on a user friendly remote user authentication scheme with smart cards[J].IEICE Transactions Fundamentals, 2004,87-A ( 8 ) : 2180-2181.
  • 7Liao I E,Lee C C,Hwang M S.A password authentication scheme over insecure networks[J].J Comput System Sci,2006,72:727-740.
  • 8Kocher P,Jaffe J,Jun B.Differential power analysis [C]//Lecture Notes in Computer Science 1666:Proc Advances in Cryptology- CRYPTO' 99.Berlin: Springer, 1999 : 388-397.

同被引文献22

  • 1黄叶珏,陈勤.一个新的动态口令认证方案[J].计算机工程与设计,2005,26(7):1735-1736. 被引量:8
  • 2冯登国,陈伟东.基于口令的安全协议的模块化设计与分析[J].中国科学(E辑),2007,37(2):223-237. 被引量:14
  • 3王滨,刘刚.动态口令认证方案的研究与改进[J].计算机工程与设计,2007,28(12):2806-2808. 被引量:8
  • 4TSAI C S, LEE C C, ttWANG M S. Password authentication schemes: Current status and key issues [ J]. lntenmtional Journal of Network Security, 2006, 3(2) : 101 - 115.
  • 5CHANG C C, WU T C. Remote password authentication with smart cards [J]. IEE Proceedings-E Computers and Digital Techniques, 1993, 138(3): 165-168.
  • 6LEE N Y, CHIU Y C. Improved renmote authentication scheme with smart card [ J]. Computer Standards and Imeffaces, 2005, 27(2) : 177 - 180.
  • 7LIAO I E, LEE C C, HWANG M S. A password authentication scheme over insecure networks [ J]. Journal of Computer and System Sciences, 2006, 72(4) : 727 -740.
  • 8GIRl D, SRIVASTAVA P D. An improved remote user authentica- tion scheme with smart cards using bilinear pairings [ EB/OL]. [2011 - 11 -20]. http://eprint, iaer. org/2006/274, pdf.
  • 9KOCHER P, JAFFE J, JUN B.Differential power analysis[C]// Pro- ceedings of the 19th Annu.,d International Cyptology Conference on Ad-vances in Cryptology, LNCS 1666. Berlin: Springer, 1999: 388-397.
  • 10MESSERGES T S, DABB1SH E A, SLOAN R H. Examining smart- card security under the threat of power analysis attacks [ J]. IEEE Transactions on Computers, 2002, 51(5): 541-552.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部