• Citations Per Year
Learn More
Most remote user authentication schemes are designed by encryption or hash-function techniques. In terms of computational cost, the hash-function-based scheme is more simple and efficient. In 2008, under the conditions of using tamper-resistant smart card device and the verifier table storage technique, Chen-Lee proposed a novel mutual authentication(More)
  • Sida Lin, Qi Xie
  • 2009 Second Pacific-Asia Conference on Web Mining…
  • 2009
Recently¿Lu and Cao proposed a novel three-party key exchange protocol. Guo et al pointed out that their protocol cannot resist man-in-the-middle attack and undetectable on-line dictionary attack, and then an improved protocol was proposed in 2008.However, we show that Guo et al’s protocol is still vulnerable to undetectable on-line dictionary(More)
  • 1