Formal analysis and systematic construction of two-factor authentication scheme
One of the most commonly used two-factor authentication mechanisms is based on smart card and user’s password. Throughout the years, there have been many schemes proposed, but most of them have already been found flawed due to the lack of formal security analysis. On the cryptanalysis of this type o...
Saved in:
Main Authors: | YANG, Guomin, WONG, Duncan S., WANG, Huaxiong, DENG, Xiaotie |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2006
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7437 https://ink.library.smu.edu.sg/context/sis_research/article/8440/viewcontent/Formal_analysis_and_systematic_construction_of_two_factor_authentication_scheme.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Two-factor mutual authentication based on smart cards and passwords
by: YANG, Guomin, et al.
Published: (2008) -
Two Robust Remote User Authentication Protocols Using Smart Cards
by: YEH, Kuo-Hui, et al.
Published: (2010) -
Analysis and improvement on a biometric-based remote user authentication scheme using smart cards
by: WEN, Fengtong, et al.
Published: (2015) -
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
by: WEN, Fengtong, et al.
Published: (2013) -
New efficient user identification and key distribution scheme providing enhanced security
by: YANG, Yanjiang, et al.
Published: (2004)