• Publications
  • Influence
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
  • W. Ku, S. Chen
  • Computer Science
  • IEEE Transactions on Consumer Electronics
  • 1 February 2004
Recently, Chien et al. proposed an efficient remote authentication scheme using smart cards. However, we find that their scheme is vulnerable to a reflection attack and an insider attack. InExpand
  • 291
  • 30
Three weaknesses in a simple three-party key exchange protocol
In 2005, Wen et al. proposed a three-party password-based authenticated key exchange protocol using Weil pairing and showed that their protocol is provably secure. Unfortunately, Nam et al.Expand
  • 88
  • 10
Cryptanalysis of modified authenticated key agreement protocol
Tseng [see ibid., vol. 36, no. 1, p. 48-9, 2000] addressed a weakness within and proposed a modification to the key agreement protocol presented by Seo and Sweeney [see ibid., vol. 35, no. 13, p.Expand
  • 55
  • 9
An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees
To achieve secure multicast communications, key management is one of the most critical problems that should be solved. So far, many multicast key management schemes have been proposed. In 1999,Expand
  • 50
  • 9
Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards
Recently, Das et al. proposed a dynamic ID-based verifier-free password authentication scheme using smart cards. To resist the ID-theft attack, the user's login ID is dynamically generated andExpand
  • 108
  • 4
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
Recently, Wang et al. showed that two new verifier-free remote user password authentication schemes, Ku-Chen's scheme and Yoon et al.'s scheme, are vulnerable to an off-line password guessing attack,Expand
  • 45
  • 4
Reparable key distribution protocols for Internet environments
A new concept of reparable key distribution protocol is introduced in this paper. The merit of a reparable protocol is in that once all compromised keys have been replaced by secure keys, theExpand
  • 59
  • 3
Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards
In 2002, Lee, Ryu and Yoo proposed an improved password authentication scheme without using a password table by employing a fingerprint verification mechanism in the user's smartcard and two servers'Expand
  • 63
  • 3
A hash-based strong-password authentication scheme without using smart cards
  • W. Ku
  • Computer Science
  • OPSR
  • 2004
So far, many strong-password authentication schemes have been proposed, however, none is secure enough. In 2003, Lin, Shen, and Hwang proposed a strong-password authentication scheme using smartExpand
  • 35
  • 3