Comments on Five Smart Card Based Password Authentication Protocols
Yalin ChenJue-Sam ChouChun-Hui HuangPublished in: CoRR (2010)
Keyphrases
- authentication protocol
- smart card
- user authentication
- password authentication
- information security
- session key
- authentication scheme
- password guessing
- security analysis
- security requirements
- secret key
- digital signature
- java card
- secure communication
- security issues
- remote user authentication scheme
- sensitive data
- countermeasures
- key distribution
- security mechanisms
- network security
- differential power analysis