Comments on five smart card based password authentication protocols.
Yalin ChenJue-Sam ChouChun-Hui HuangPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- authentication protocol
- smart card
- user authentication
- password authentication
- information security
- session key
- authentication scheme
- password guessing
- security analysis
- secret key
- java card
- security requirements
- remote user authentication scheme
- digital signature
- secure communication
- security mechanisms
- key distribution
- countermeasures
- real time
- network security
- cryptographic protocols
- power analysis
- differential power analysis
- security model
- security issues
- query processing
- information systems