On security of a remote user authentication scheme without using smart cards.
Debiao HeJianhua ChenJin HuPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- smart card
- remote user authentication scheme
- security requirements
- information security
- java card
- security mechanisms
- security analysis
- password guessing
- sensitive data
- authentication protocol
- user authentication
- secure communication
- sys tems
- authentication scheme
- security issues
- digital signature
- access requests
- countermeasures
- password authentication
- network security
- secret key
- security model
- security protocols
- public key infrastructure
- packet filtering
- key management
- anomaly detection
- wireless sensor networks