Security Weaknesses of a Timestamp-Based User Authentication Scheme with Smart Card

Download Now
Provided by: International Journal of Information and Education Technology (IJIET)
Topic: E-Commerce
Format: PDF
With the rapid increasing need of the internet service and electronic commerce technology, user authentication schemes are an essential security requirement for protecting systems and networks. Remote user authentication scheme is commonly used for communication between authorized remote users over insecure network. Due to its simplicity and convenience, it is widely used in many environments such as E-commerce or remote host login. In recent years, several remote user authentication schemes using smart card have been proposed. Recently, the researcher proposed a timestamp-based user authentication scheme with smart card. They claimed that their scheme can resist off-line password guessing attack.
Download Now

Find By Topic