Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 21
Page No. 8016 - 8025

Cryptanalysis and Improvements of a Timestamp-Based User Authentication Scheme for Wireless Communications

Authors : Jaewook Jung, Younsung Choi, Youngsook Lee and Dongho Won

References

Awasthi, A.K., K. Srivastava and R.C. Mittal, 2011. An improved timestamp-based remote user authentication scheme. Comput. Electr. Eng., 37: 869-874.
CrossRef  |  Direct Link  |  

Chan, C.K. and L.M. Cheng, 2001. Cryptanalysis of a timestamp-based password authentication scheme. Comput. Secur., 21: 74-76.
CrossRef  |  Direct Link  |  

Choi, Y., D. Lee, J. Kim, J. Jung, and J. Nam et al., 2014. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sens., 14: 10081-10106.
CrossRef  |  Direct Link  |  

Fan, L., J.H. Li and H.W. Zhu, 2002. An enhancement of timestamp-based password authentication scheme. Int. J. Comput. Secur., 21: 665-667.
CrossRef  |  Direct Link  |  

Hsu, C.L., 2004. Security of Chien et al.'s remote user authentication scheme using smart cards. Comput. Stand. Interfac., 26: 167-169.
CrossRef  |  Direct Link  |  

Huang, H.F., H.W. Chang and P.K. Yu, 2014. Enhancement of timestamp-based user authentication scheme with smart card. Intl. J. Network Secur., 16: 463-467.
Direct Link  |  

Hwang, T. and W.C. Ku, 1995. Reparable key distribution protocols for Internet environments. IEEE. Trans. Commun., 43: 1947-1949.
CrossRef  |  Direct Link  |  

Jung, J., W. Jeon and D. Won, 2014. An enhanced remote user authentication scheme using smart card. Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, January 9-11, 2014, ACM, New York, USA., ISBN:978-1-4503-2644-5, pp: 1-5.

Kim, J., D. Lee, W. Jeon, Y. Lee and D. Won, 2014. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sens., 14: 6443-6462.
CrossRef  |  Direct Link  |  

Kocher, P., J. Jaffe and B. Jun, 1999. Differential power analysis. Proceedings of the 19th Annual International Conference on Cryptology, August 15-19, 1999, Springer, Berlin, Germany, pp: 388-397.

Ku, W.C., C.M. Chen and H.L. Lee, 2003. Cryptanalysis of a variant of Peyravian-Zunic’s password authentication scheme. IEICE. Trans. Commun., 86: 1682-1684.
Direct Link  |  

Lamport, L., 1981. Password authentication with insecure communication. Commun. ACM, 24: 770-772.
CrossRef  |  Direct Link  |  

Liu, J.Y., A.M. Zhou and M.X. Gao, 2008. A new mutual authentication scheme based on nonce and smart cards. Comput. Commun., 31: 2205-2209.
CrossRef  |  Direct Link  |  

Rivest, R.L., A. Shamir and L. Adleman, 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM., 21: 120-126.
CrossRef  |  Direct Link  |  

Shen, J.J., C.W. Lin and M.S. Hwang, 2003. Security enhancement for the timestamp-based password authentication scheme using smart cards. Int. J. Comput. Secur., 22: 591-595.
CrossRef  |  

Stallings, W., 2003. Cryptography and Network Security: Principles and Practices. 3rd Edn., Prentice Hall, Upper Saddle River, New Jersey, USA., ISBN:9780130914293, Pages: 681.

Sun, D.Z., J.P. Huai, J.Z. Sun and J.X. Li, 2009. Cryptanalysis of a mutual authentication scheme based on nonce and smart cards. Comput. Commun., 32: 1015-1017.
CrossRef  |  Direct Link  |  

Yang, W.H. and S.P. Shieh, 1999. Password authentication schemes with smart card. Comput. Secur., 18: 727-733.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved