Universidad de La Rioja

Displaying 1-1 of 1 results

  • White Papers // Jul 2012

    Cryptanalysis of Sood et al.'s Authentication Scheme using Smart Cards

    The most popular mechanism to carry out the user authentication is by means of password-based authentication protocols. However, the server must store and maintain the identities and password of each user in a database, making possible the insider attack (Ku and Chen, 2004). In 2010, Sood-Sarje-Singh proposed a dynamic ID-based...

    Provided By Universidad de La Rioja

  • White Papers // Jul 2012

    Cryptanalysis of Sood et al.'s Authentication Scheme using Smart Cards

    The most popular mechanism to carry out the user authentication is by means of password-based authentication protocols. However, the server must store and maintain the identities and password of each user in a database, making possible the insider attack (Ku and Chen, 2004). In 2010, Sood-Sarje-Singh proposed a dynamic ID-based...

    Provided By Universidad de La Rioja