A more efficient and secure dynamic ID-based remote user authentication scheme

@article{Wang2009AME,
  title={A more efficient and secure dynamic ID-based remote user authentication scheme},
  author={Yan-yan Wang and Jia-yong Liu and Feng-xia Xiao and Jing Dan},
  journal={Computer Communications},
  year={2009},
  volume={32},
  pages={583-585}
}
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme. This scheme allows users to change and choose passwords freely, and the server does not maintain any verifier table. It is also secure to against ID-theft, replay attacks and insider attacks and so on. However, research has been done to point that it is completely insecure for its independent of the password. Furthermore, it did not achieve mutual authentication and could not resist impersonate remote… CONTINUE READING

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 197 CITATIONS

Efficient mobile dynamic ID authentication and key agreement scheme without trusted servers

  • Int. J. Communication Systems
  • 2017
VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A dynamic identity-based user authentication scheme for remote login systems

  • Security and Communication Networks
  • 2015
VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

User authentication scheme preserving anonymity for ubiquitous devices

  • Security and Communication Networks
  • 2015
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Security flaws in two improved remote user authentication schemes using smart cards

  • Int. J. Communication Systems
  • 2014
VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A Smart-Card-Based Remote User Authentication Protocol with Privacy Support

  • 2012 13th International Conference on Parallel and Distributed Computing, Applications and Technologies
  • 2012
VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Improvements on two password-based authentication protocols

  • IACR Cryptology ePrint Archive
  • 2009
VIEW 9 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A Survey of Authentication Schemes in Telecare Medicine Information Systems

  • Journal of Medical Systems
  • 2016
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2009
2019

CITATION STATISTICS

  • 20 Highly Influenced Citations

  • Averaged 7 Citations per year from 2017 through 2019