The study of remote user authentication protocol
碩士 === 淡江大學 === 資訊工程學系碩士班 === 93 === In 2002, Lee, Li and Hwang proposed the remote user authentication protocol but their scheme is not secure. It suffered password guessing attack, stolen-verifier attack, denial of service attack and server spoofing. Therefore, we propose the improved scheme based...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/37897439515531924479 |
id |
ndltd-TW-093TKU05392040 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093TKU053920402015-10-13T11:57:26Z http://ndltd.ncl.edu.tw/handle/37897439515531924479 The study of remote user authentication protocol 遠端身份鑑別機制之研究 Jui-Chu Peng 彭瑞珠 碩士 淡江大學 資訊工程學系碩士班 93 In 2002, Lee, Li and Hwang proposed the remote user authentication protocol but their scheme is not secure. It suffered password guessing attack, stolen-verifier attack, denial of service attack and server spoofing. Therefore, we propose the improved scheme based on Lee-Li-Hwang scheme. According to the concepts of BAN logic, we provide the proof of session key authentication. Ren-Junn Hwang 黃仁俊 2005 學位論文 ; thesis 77 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 淡江大學 === 資訊工程學系碩士班 === 93 === In 2002, Lee, Li and Hwang proposed the remote user authentication protocol but their scheme is not secure. It suffered password guessing attack, stolen-verifier attack, denial of service attack and server spoofing. Therefore, we propose the improved scheme based on Lee-Li-Hwang scheme. According to the concepts of BAN logic, we provide the proof of session key authentication.
|
author2 |
Ren-Junn Hwang |
author_facet |
Ren-Junn Hwang Jui-Chu Peng 彭瑞珠 |
author |
Jui-Chu Peng 彭瑞珠 |
spellingShingle |
Jui-Chu Peng 彭瑞珠 The study of remote user authentication protocol |
author_sort |
Jui-Chu Peng |
title |
The study of remote user authentication protocol |
title_short |
The study of remote user authentication protocol |
title_full |
The study of remote user authentication protocol |
title_fullStr |
The study of remote user authentication protocol |
title_full_unstemmed |
The study of remote user authentication protocol |
title_sort |
study of remote user authentication protocol |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/37897439515531924479 |
work_keys_str_mv |
AT juichupeng thestudyofremoteuserauthenticationprotocol AT péngruìzhū thestudyofremoteuserauthenticationprotocol AT juichupeng yuǎnduānshēnfènjiànbiéjīzhìzhīyánjiū AT péngruìzhū yuǎnduānshēnfènjiànbiéjīzhìzhīyánjiū AT juichupeng studyofremoteuserauthenticationprotocol AT péngruìzhū studyofremoteuserauthenticationprotocol |
_version_ |
1716851830577692672 |