The study of remote user authentication protocol
碩士 === 淡江大學 === 資訊工程學系碩士班 === 93 === In 2002, Lee, Li and Hwang proposed the remote user authentication protocol but their scheme is not secure. It suffered password guessing attack, stolen-verifier attack, denial of service attack and server spoofing. Therefore, we propose the improved scheme based...
Main Authors: | Jui-Chu Peng, 彭瑞珠 |
---|---|
Other Authors: | Ren-Junn Hwang |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/37897439515531924479 |
Similar Items
-
A Study of Efficient Remote User Authentication Protocol with Smart Cards
by: Wei-Chen Wei, et al.
Published: (2007) -
The Study on Remote Identity- Authentication and Key Renewal Protocols
by: Ray-Lin Oyan, et al.
Published: (2000) -
A study of Authenticating Remote User
by: Jia Lun Tsai, et al.
Published: (2007) -
A remote user authentication protocol for multi-server architecture based on ECC
by: Guan-Da Liou, et al.
Published: (2016) -
A Study on Remote User Authentication Schemes
by: Jia-Ie Shiue, et al.
Published: (2004)