Access the full text.
Sign up today, get DeepDyve free for 14 days.
W. Ku, H. Tsai, Shuai-Min Chen (2003)
Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocolACM SIGOPS Oper. Syst. Rev., 37
M. Sandirigama, A. Shimizu, M. Noda (2000)
Simple and Secure Password Authentication Protocol (SAS)IEICE Transactions on Communications, 83
W. Ku, Chien‐Ming Chen, Hui-Lung Lee (2003)
Cryptanalysis of a Variant of Peyravian-Zunic's Password Authentication SchemeIEICE Transactions on Communications, 86
S. Bellovin, Michael Merritt (1993)
Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise
(2003)
Standard specifications for password-based public-key cryptographic techniques )
L. Gong (1995)
Optimal authentification protocols resistant to password guessing attacksProceedings The Eighth IEEE Computer Security Foundations Workshop
T. Tsuji, A. Shimizu (2003)
An Impersonation Attack on One-Time Password Authentication Protocol OSPAIEICE Transactions on Communications, 86
Chien‐Ming Chen, W. Ku (2002)
Stolen-Verifier Attack on Two New Strong-Password Authentication ProtocolsIEICE Transactions on Communications
(1990)
A dynamic password authentication method by one-way function
L. Lamport (1981)
Password authentication with insecure communicationCommunications of The ACM, 24
Chun-Li Lin, Hung-Min Sun, T. Hwang (2001)
Attacks and Solutions on Strong-Password AuthenticationIEICE Transactions on Communications, 84
(1994)
The S/KEY (TM) one-time password system
T. Hwang, W. Ku (1995)
Reparable key distribution protocols for Internet environmentsIEEE Trans. Commun., 43
David Jablon (1996)
Strong password-only authenticated key exchangeComput. Commun. Rev., 26
(1998)
A password authentication methods for contents communication on the Internet
Chih-Wei Lin, Jau-Ji Shen, M. Hwang (2003)
Security enhancement for Optimal Strong-Password Authentication protocolACM SIGOPS Oper. Syst. Rev., 37
C. Mitchell, Liqun Chen (1996)
Comments on the S/KEY user authentication schemeACM SIGOPS Oper. Syst. Rev., 30
So far, many strong-password authentication schemes have been proposed, however, none is secure enough. In 2003, Lin, Shen, and Hwang proposed a strong-password authentication scheme using smart cards, and claimed that their scheme can resist the guessing attack, the replay attack, the impersonation attack, and the stolen-verifier attack. Later, Ku, Tsai, and Chen showed that Lin-Shen-Hwang's scheme suffers from a replay attack and a denial-of-service attack. Herein, we propose a more secure hash-based strong-password authentication scheme without using smart cards.
ACM SIGOPS Operating Systems Review – Association for Computing Machinery
Published: Jan 1, 2004
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.