Security

Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme Using Smart Cards, and a Key Agreement Scheme for Two-Party Communication

Download Now Free registration required

Executive Summary

The motivation behind development password authentication schemes1 is to help legitimate users or clients to acquire services from a legitimate provider or server. Whenever a user wants a service from a provider, it has to identify itself to the provider by some means. Password authentication has been one of the most convenient schemes for user identification over the years. Now a day's millions of providers use password authentication schemes to identify legitimate users. Common examples include E-mail services, E-banking services, personal web albums services, blog services, participation on web forums, shopping on Internet, etc.

  • Format: PDF
  • Size: 152 KB