Abstract
A family (tree) of 2-party password-based authentication protocols based on smart cards abounds in security literature, more popularly known as remote user authentication schemes using smart cards. In this paper, we give a generic treatment to the security and analyses of such protocols, tracing back to the original versions due to Hwang et al. and Hwang-Li from which many variants have been derived. Our work here highlights the security implications of taking the break-and-tweak approach to protocol design.
| Original language | English |
|---|---|
| Title of host publication | Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings |
| Publisher | Springer |
| Pages | 1213-1221 |
| Number of pages | 9 |
| ISBN (Print) | 9783540735489 |
| DOIs | |
| Publication status | Published - 2007 |
| Externally published | Yes |
| Event | International Conference on Ubiquitous and Intelligence Computing 2007 - Hong Kong, China Duration: 11 Jul 2007 → 13 Jul 2007 Conference number: 4th https://link.springer.com/book/10.1007%2F978-3-540-73549-6 (Proceedings) |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 4611 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | International Conference on Ubiquitous and Intelligence Computing 2007 |
|---|---|
| Abbreviated title | UIC 2007 |
| Country/Territory | China |
| City | Hong Kong |
| Period | 11/07/07 → 13/07/07 |
| Internet address |