Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 19
Page No. 7013 - 7019

Weaknesses of Anonymous Mutual Authentication Schemes for Roaming Service with Smart Cards

Authors : YounsungChoi

References

Choi, Y., D. Lee, J. Kim, J. Jung, and J. Nam et al., 2014. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sens., 14: 10081-10106.
CrossRef  |  Direct Link  |  

Choi, Y., J. Nam, D. Lee, J. Kim and J. Jung et al., 2014. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics. Sci World J., 2014: 1-15.
PubMed  |  Direct Link  |  

Guo, C., C.C. Chang and C.Y. Sun, 2013. Chaotic maps-based mutual authentication and key agreement using smart cards for wireless communications. J. Inf. Hiding Multimedia Signal Proc., 4: 99-109.
Direct Link  |  

He, D., M. Ma, Y. Zhang, C. Chen and J. Bu, 2010. A strong user authentication scheme with smart cards for wireless communications. Comput. Commun., 34: 367-374.
Direct Link  |  

Jerabek, E., 2016. Integer factoring and modular square roots. J. Comput. Syst. Sci., 82: 380-394.
CrossRef  |  Direct Link  |  

Jung, J., J. Kim, Y. Choi and D. Won, 2016. An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks. Sens., 16: 1-30.
CrossRef  |  PubMed  |  Direct Link  |  

Kang, D., J. Jung, J. Mun, D. Lee and Y. Choi et al., 2016. Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. Secur. Commun. Netw., 9: 1462-1476.
CrossRef  |  Direct Link  |  

Lee, C.C., M.S. Hwang and I.E. Liao, 2006. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE. Trans. Ind. Electron., 53: 1683-1687.
CrossRef  |  Direct Link  |  

Liu, C.S., L. Xu, L. Lin, M.C. Tseng and S.Y. Lin et al., 2016. Mutual authentication with anonymity for roaming service with smart cards in wireless communications. Proceedings of the International Conference on Network and System Security, September 28-30, 2016, Springer, Cham, Switzerland, ISBN:978-3-319-46297-4, pp: 47-61.

Ma, C.G., D. Wang and S.D. Zhao, 2014. Security flaws in two improved remote user authentication schemes using smart cards. Intl. J. Commun. Syst., 27: 2215-2227.
CrossRef  |  PubMed  |  Direct Link  |  

Mun, J., J. Kim, D. Lee, J. Jung and Y. Choi et al., 2015. An improvement of efficient dynamic ID-based user authentication scheme using smart cards without verifier tables. Proceedings of the International Conference on Security and Management (SAM'15) and the Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), July 27-30, 2015, Las Vegas, Nevada, pp: 152-156.

Rabin, M.O., 1979. Digitalized signatures and public-key functions as intractable as factorization. Master Thesis, Massachusetts Institute of Technology Cambridge, Massachusetts USA.

Sui, A.F., L.C.K. Hui, S.M. Yiu, K.P. Chow and W.W. Tsang et al., 2005. An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication. Proceedings of the IEEE International Conference on Wireless Communications and Networking Vol. 4, March 13-17, 2005, IEEE, New Orleans, Louisiana, USA., pp: 2088-2093.

Williams, H., 1980. A modification of the RSA public-key encryption procedure (Corresp.). IEEE. Trans. Inf. Theory, 26: 726-729.
CrossRef  |  Direct Link  |  

Xu, J., W.T. Zhu and D.G. Feng, 2011. An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun., 34: 319-325.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved