Please use this identifier to cite or link to this item: http://idr.nitk.ac.in/jspui/handle/123456789/7581
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMadhusudhan, R.
dc.contributor.authorKumar, R.S.
dc.date.accessioned2020-03-30T10:02:31Z-
dc.date.available2020-03-30T10:02:31Z-
dc.date.issued2014
dc.identifier.citationProceedings - IEEE 8th International Symposium on Service Oriented System Engineering, SOSE 2014, 2014, Vol., , pp.474-477en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/7581-
dc.description.abstractRemote user authentication using smart cards is a method of verifying the legitimacy of remote users accessing the server through insecure channel, by using smart cards to increase the efficiency of the system. During last couple of years many protocols to authenticate remote users using smart cards have been proposed. But unfortunately, most of them are proved to be unsecure against various attacks. Recently this year, Yung-Cheng Lee improved Shin et al.'s protocol and claimed that their protocol is more secure. In this article, we have shown that Yung-Cheng-Lee's protocol too has defects. It does not provide user anonymity; it is vulnerable to Denial-of-Service attack, Session key reveal, user impersonation attack, Server impersonation attack and insider attacks. Further it is not efficient in password change phase since it requires communication with server and uses verification table. � 2014 IEEE.en_US
dc.titleCryptanalysis of a remote user authentication protocol using smart cardsen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.