Abstract
A family (tree) of 2-party password-based authentication protocols based on smart cards abounds in security literature, more popularly known as remote user authentication schemes using smart cards. In this paper, we give a generic treatment to the security and analyses of such protocols, tracing back to the original versions due to Hwang et al. and Hwang-Li from which many variants have been derived. Our work here highlights the security implications of taking the break-and-tweak approach to protocol design.
Original language | English |
---|---|
Title of host publication | Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings |
Publisher | Springer |
Pages | 1213-1221 |
Number of pages | 9 |
ISBN (Print) | 9783540735489 |
DOIs | |
Publication status | Published - 2007 |
Externally published | Yes |
Event | International Conference on Ubiquitous and Intelligence Computing 2007 - Hong Kong, China Duration: 11 Jul 2007 → 13 Jul 2007 Conference number: 4th https://link.springer.com/book/10.1007%2F978-3-540-73549-6 (Proceedings) |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 4611 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | International Conference on Ubiquitous and Intelligence Computing 2007 |
---|---|
Abbreviated title | UIC 2007 |
Country/Territory | China |
City | Hong Kong |
Period | 11/07/07 → 13/07/07 |
Internet address |