Cited by 13
On the Security of Some Password Authentication Protocols

Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks
Eun-Jun Yoon, Kee-Young Yoo
Book:  Lecture Notes in Computer Science (Computational Science and Its Applications - ICCSA 2006) Volume 3980 (2006), p. 1156
Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications
Injoo Jang, Hyeong Seon Yoo
Conference:  (2009), p. 1
A novel remote user authentication scheme using bilinear pairings
Manik Lal Das, Ashutosh Saxena, Ved P. Gulati, Deepak B. Phatak
Journal:  Computers & Security Volume 25, Issue 3 (2006), p. 184
An improved bilinear pairing based remote user authentication scheme
Thulasi Goriparthi, Manik Lal Das, Ashutosh Saxena
Journal:  Computer Standards & Interfaces Volume 31, Issue 1 (2009), p. 181
Design of improved password authentication and update scheme based on elliptic curve cryptography
SK Hafizul Islam, G.P. Biswas
Journal:  Mathematical and Computer Modelling Volume 57, Issue 11-12 (2013), p. 2703
Further Improved Remote User Authentication Scheme
Jung-Yoon KIM, Hyoung-Kee CHOI, John A. COPELAND
Journal:  IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Volume E94-A, Issue 6 (2011), p. 1426
Improvement of the ElGamal Based Remote Authentication Scheme Using Smart Cards
Yung-Cheng Lee, Yi-Chih Hsieh, Pei-Ju Lee, Peng-Sheng You
Journal:  Journal of Applied Research and Technology Volume 12, Issue 6 (2014), p. 1063
Improvement of the Peyravian–Jeffries’s user authentication protocol and password change protocol
Marko Hölbl, Tatjana Welzer, Boštjan Brumen
Journal:  Computer Communications Volume 31, Issue 10 (2008), p. 1945
Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards
Jung-Yoon KIM, Hyoung-Kee CHOI
Journal:  IEICE Transactions on Information and Systems Volume E95.D, Issue 10 (2012), p. 2393
On the Security of the Discrete Logarithm Based Remote Authentication Scheme Using Smart Cards
Yung Cheng Lee, Pei Ju Lee
Journal:  Applied Mechanics and Materials Volume 479-480 (2013), p. 963
Secure remote user access over insecure networks
Mohammad Peyravian, Clark Jeffries
Journal:  Computer Communications Volume 29, Issue 5 (2006), p. 660
Security flaws of remote user access over insecure networks
Kyung-Ah Shim
Journal:  Computer Communications Volume 30, Issue 1 (2006), p. 117
Smart-card-loss-attack and Improvement of Hsiang et al.’s Authentication Scheme
Y.C. Lee
Journal:  Journal of Applied Research and Technology Volume 11, Issue 4 (2013), p. 597