Scheduled System Maintenance on December 17th, 2014:
IEEE Xplore will be upgraded between 2:00 and 5:00 PM EST (18:00 - 21:00) UTC. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Security Analysis of Timestamp-based Remote User Authentication Scheme Using Smart Cards

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yong-Zhuang Wei ; Dept. of Commun. & Inf. Eng., Guilin Univ. of Electron. Technol. ; Yu-Pu Hu

Recently, Shen, Lin, and Hwang proposed a modified Yang-Shieh's password authentication scheme to enhance security. In 2004, Yang and Chen et al. point out that Shen-Lin-Hwang's scheme was vulnerable to the forged login attack. Later, Wang and Li present a new efficient timestamp-based remote user authentication scheme via further modified Shen-Lin-Hwan's scheme. And they also claimed that their new modified scheme could withstand the forged login attack. However, in this paper, we show that the Yang and Li's improvement scheme is still vulnerable to the reflection attack, and propose our improvement scheme

Published in:

Communications, Circuits and Systems Proceedings, 2006 International Conference on  (Volume:3 )

Date of Conference:

25-28 June 2006