Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/7582
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMadhusudan, R.
dc.contributor.authorValiveti, A.
dc.date.accessioned2020-03-30T10:02:31Z-
dc.date.available2020-03-30T10:02:31Z-
dc.date.issued2015
dc.identifier.citationI4CT 2015 - 2015 2nd International Conference on Computer, Communications, and Control Technology, Art Proceeding, 2015, Vol., , pp.476-480en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/7582-
dc.description.abstractPassword authentication with smart card is one of the most convenient and effective two-factor authentication mechanisms for remote systems to assure one communicating party of the legitimacy of the corresponding party by acquisition of corroborative evidence. This technique has been widely deployed for various kinds of authentication applications, such as remote host login, online banking, e-commerce and e-health. Recently, Kumari et al. presented a dynamic-identity-based user authentication scheme with session key agreement. In this research, we illustrate that Kumari et al.'s scheme violates the purpose of dynamic-identity contrary to author's claim. We show that once the smart card of an arbitrary user is lost, messages of all registered users are at risk. Using information from an arbitrary smart card, an adversary can impersonate any user of the system. � 2015 IEEE.en_US
dc.titleCryptanalysis of remote user authentication scheme with key agreementen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.