Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Two Secure Remote User Authentication Schemes using Smart Cards

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Xue-Guang Wang ; Sch. of Inf. Sci. & Technol., East China Univ. of Politics & Law, Shanghai ; Zhen-Chuan Chai

Remote user authentication is essential in network environment to protect unauthorized access of a networked system. Over the past years, many remote user authentication schemes have been put forth. In 2003, to prevent from forgery attacks encountered in Hwang-Li's scheme, a modified remote user authentication scheme was proposed by Shen, Lin and Hwang. However, Leung, Chang, Fong and Chen showed the modified scheme is still insecure. Therefore, in the paper, we would like to improve Shen et al. scheme and propose another secure remote user authentication scheme from bilinear pairings

Published in:

Machine Learning and Cybernetics, 2006 International Conference on

Date of Conference:

13-16 Aug. 2006