Online citations, reference lists, and bibliographies.
← Back to Search

A Dynamic ID-based Remote User Authentication Scheme

M. Das, A. Saxena, V. Gulati
Published 2004 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based remote user authentication schemes both with and without smart cards have been proposed. Most of the schemes do not allow the users to choose and change their passwords, and maintain a verifier table to verify the validity of the user login. In this paper we present a dynamic ID-based remote user authentication scheme using smart cards. Our scheme allows the users to choose and change their passwords freely, and do not maintain any verifier table. The scheme is secure against ID-theft, and can resist the reply attacks, forgery attacks, guessing attacks, insider attacks and stolen verifier attacks.
This paper references



This paper is referenced by
10.1186/S13677-015-0030-Z
A secure user authentication protocol for sensor network in data capturing
Zhou Quan (2015)
10.1109/ISDA.2010.5687101
On security of a more efficient and secure dynamic ID-based remote user authentication scheme
C. Lee (2010)
10.14400/JDPM.2013.11.11.675
A Study on Multi-Media Contents Security using Smart Phone
Dong-Ryool Kim (2013)
10.21307/IJSSIS-2017-572
A NOVEL TRI-FACTOR MUTUAL AUTHENTICATION WITH BIOMETRICS FOR WIRELESS BODY SENSOR NETWORKS IN HEALTHCARE APPLICATIONS
Chen-Guang He (2013)
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
Sonam Devgan Kaul (2015)
10.1002/sec.1264
A dynamic identity-based user authentication scheme for remote login systems
C. Li (2015)
10.1016/j.adhoc.2006.05.003
Threshold password authentication against guessing attacks in Ad hoc networks
Zhenchuan Chai (2007)
10.1109/ISPACS.2012.6473596
Cryptanalysis of a robust and efficient smart card oriented remote user authentication protocol
W. Horng (2012)
10.1109/I-SOCIETY16502.2010.6018817
Improvement of the dynamic ID-based remote user authentication scheme
R. Martínez-Peláez (2010)
10.1007/978-3-642-41674-3_60
Cryptanalysis of Encrypted Remote User Authentication Scheme by Using Smart Card
Jongho Mun (2014)
10.1109/TC.2013.27
Toward Wireless Security without Computational Assumptions—Oblivious Transfer Based on Wireless Channel Characteristics
Zhuo Hao (2014)
10.1371/journal.pone.0232277
Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
Chi-Tung Chen (2020)
10.1007/s10916-014-0017-1
On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
Kee-Won Kim (2014)
10.1145/2857546.2857570
Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function
J. Jung (2016)
Security Analysis of A Dynamic ID-based Remote User Authentication Scheme
A. Awasthi (2004)
10.1007/S11767-012-0883-Y
An improved remote password authentication scheme with smart card
Jing Chao (2012)
Design, Testing and Implementation of a New Authentication Method Using Multiple Devices
Cagri Cetin (2015)
ADVANCED SECURE REMOTE USER AUTHENTICATION SCHEME PRESERVING USER ANONYMITY
ra Sekhar Vorugunti (2012)
A Defended and Adequate Mutual Verification with Key Concession Architecture in Wireless Network
N. Praveen Kumar (2016)
A Noble Remote User Authentication Protocol Based on Smart Card Using Hash Function
Deepchand Ahirwal (2013)
Implementation of Single Sign-On Mechanism for Distributed Computing
Rinky G. Chhatwani (2014)
Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
Sung-Woon Lee (2008)
A Flexible and Secure Remote Systems Authentication Scheme Using Smart Cards
M. Das (2008)
Remote User Authentication Protocol for Multi-Server Architecture Based on ECC
V. Chaugule (2015)
10.5120/20011-1970
An Enhanced Secure Remote User Authentication Scheme without Verification Table
S. Binu (2015)
A Smart Card-based Authentication Scheme Using User Identify Cryptography
C. Chang (2013)
10.1109/IIHMSP.2011.51
A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol
C. Chang (2011)
10.1007/s10586-017-1575-z
A security-enhanced mutual authentication scheme with privacy protected in wireless sensor networks
Haitao Yu (2017)
10.1109/ISDA.2010.5687103
Cryptanalysis of Khan et al.'s dynamic ID-based remote user authentication scheme
C. Li (2010)
10.1109/NETAPPS.2010.18
A User Authentication Scheme Based on Identity-bits Commitment for Wireless Sensor Networks
N. Jamil (2010)
10.1007/978-3-642-29157-9_39
Dynamic ID-Based Password Authentication Protocol with Strong Security against Smart Card Lost Attacks
Qi Xie (2011)
10.1007/978-3-642-22714-1_65
Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment
S. H. Islam (2011)
See more
Semantic Scholar Logo Some data provided by SemanticScholar