Security

New Cryptanalysis of an ID-Based Password Authentication Scheme Using Smart Cards and Fingerprints

Free registration required

Executive Summary

Recently, remote user authentication has become an important technique in modern computer network systems, in which, it is used to validate the legitimacy of a remote login user. In a client/server system, when the client wants to login to a remote server, the remote server requires a password to authenticate the identity of the client. So far, multi-user authentication schemes for password or multimedia data have been proposed. In traditional password authentication scheme, a number of remote users/servers have to be able to access/authenticate the server/users with his/her identity and password.

  • Format: PDF
  • Size: 333.28 KB