Cited by 62
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards

2005 Pakistan Section Multitopic Conference
Muhammad Khurram Khan, Jiashu Zhang
Conference  (2005), p. 1
2006 International Conference on Machine Learning and Cybernetics
Xue-guang Wang, Zhen-chuan Chai
Conference  (2006), p. 2653
2007 International Conference on Communications, Circuits and Systems
Tang Anyang, Xu Chunxiang
Conference  (2007), p. 484
2007 International Conference on Communications, Circuits and Systems
Hong-Wei Sun, Kwok-Yan Lam, Ming Gu, Jia-Guang Sun
Conference  (2007), p. 476
2007 International Conference on Communications, Circuits and Systems
Hong-Wei Sun, Kwok-Yan Lam, Ming Gu, Jia-Guang Sun
Conference  (2007), p. 472
2007 International Conference on Information and Emerging Technologies
Muhammad Khurram Khan
Conference  (2007), p. 1
2008 Eighth International Conference on Intelligent Systems Design and Applications
Wen-Bing Horng, Cheng-Ping Lee
Conference  (2008), p. 297
2008 ISECS International Colloquium on Computing, Communication, Control, and Management
Lijiang Zhang, Puwen Wei
Conference  (2008), p. 419
2008 International Conference on Convergence and Hybrid Information Technology
Lijiang Zhang, Puwen Wei
Conference  (2008), p. 257
2008 International Conference on Information Security and Assurance (isa 2008)
Jing Xu, Wen-Tao Zhu, Deng-Guo Feng
Conference  (2008), p. 87
2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Jianbin Li, Kwok-Yan Lam, Hong-Wei Sun, Siu-Leung Chung
Conference  (2008), p. 1113
2008 International Symposium on Biometrics and Security Technologies
Muhammad Khurram Khan
Conference  (2008), p. 1
2008 Third International Conference on Communications and Networking in China
Wei-Chi Ku, Hao-Rung Chung, Maw-Jinn Tsaur, Szu-Yao Wang
Conference  (2008), p. 1275
2008 Workshop on Power Electronics and Intelligent Transportation System
Jianyan Geng, Lijiang Zhang
Conference  (2008), p. 33
2009 Third International Conference on Network and System Security
Muhammad Khurram Khan
Conference  (2009), p. 420
2010 10th International Conference on Intelligent Systems Design and Applications
Chun-Ta Li, Chen-Ju Liu, Cheng-Chi Lee, Chin-Wen Lee
Conference  (2010), p. 1382
2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing
Chin-Ling Chen, Yu-Fan Lin, Neng-Chung Wang, Young-Long Chen
Conference  (2011), p. 53
2011 Ninth International Conference on Software Engineering Research, Management and Applications
Ariel M. Sison, Bartolome T. Tanguilig III, Bobby D. Gerardo, Yung-Cheol Byun
Conference  (2011), p. 113
2013 International Symposium on Biometrics and Security Technologies
Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao
Conference  (2013), p. 105
2017 International Conference on Information Technology (ICIT)
Kumar Sekhar Roy, Hemanta Kumar Kalita
Conference  (2017), p. 202
A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce
Amit K. Awasthi, Keerti Srivastava
Journal  Journal of Medical Systems Volume 37, Issue 5 (2013)
A Novel Multi-Server Authentication Scheme for e-commerce Applications Using Smart Card
Kakali Chatterjee, Asok De
Journal  Wireless Personal Communications Volume 91, Issue 1 (2016), p. 293
A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card
Jangirala Srinivas, Sourav Mukhopadhyay, Dheerendra Mishra
Journal  Wireless Personal Communications Volume 96, Issue 4 (2017), p. 6273
A Smart Card Based Lightweight Multi Server Encryption Scheme
Pranav Vyas
Book  Communications in Computer and Information Science (Soft Computing and its Engineering Applications) Volume 1374 (2021), p. 212
A dynamic identity‐based user authentication scheme for remote login systems
Chun‐Ta Li, Cheng‐Chi Lee, Chi‐Yao Weng
Journal  Security and Communication Networks Volume 8, Issue 18 (2015), p. 3372
A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients
Yi-Pin Liao, Chih-Ming Hsiao
Journal  Future Generation Computer Systems Volume 29, Issue 3 (2013), p. 886
A secure dynamic ID based remote user authentication scheme for multi-server environment
Yi-Pin Liao, Shuenn-Shyang Wang
Journal  Computer Standards & Interfaces Volume 31, Issue 1 (2009), p. 24
A secure remote user mutual authentication scheme using smart cards
Marimuthu Karuppiah, R. Saravanan
Journal  Journal of Information Security and Applications Volume 19, Issue 4-5 (2014), p. 282
An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks
Tsu-Yang Wu, Zhiyuan Lee, Mohammad S. Obaidat, Saru Kumari, Sachin Kumar, Chien-Ming Chen
Journal  IEEE Access Volume 8 (2020), p. 28096
An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards
Muhammad Khurram Khan, Jiashu Zhang
Book  Lecture Notes in Computer Science (Information Security Practice and Experience) Volume 3903 (2006), p. 260
An Improved Lu-Cao’s Remote User Authentication Scheme Using Smart Card
Eun-Jun Yoon, Kee-Young Yoo
Book  Lecture Notes in Computer Science (Public Key Infrastructure) Volume 4043 (2006), p. 45
An Improved Mutual Authentication Mechanism for Securing Smart Phones
Wen-Bin Hsieh, Jenq-Shiou Leu
Journal  Wireless Personal Communications Volume 97, Issue 2 (2017), p. 2911
An Improvement on Remote User Authentication Schemes Using Smart Cards
Chin-Ling Chen, Yong-Yuan Deng, Yung-Wen Tang, Jung-Hsuan Chen, Yu-Fan Lin
Journal  Computers Volume 7, Issue 1 (2018), p. 9
An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures
Wen-Bin Hsieh, Jenq-Shiou Leu
Journal  The Journal of Supercomputing Volume 70, Issue 1 (2014), p. 133
An enhanced remote user authentication scheme using smart cards
A.K. Awasthi, S. Lal
Journal  IEEE Transactions on Consumer Electronics Volume 50, Issue 2 (2004), p. 583
Applying biometrics to design three‐factor remote user authentication scheme with key agreement
Xiong Li, Jianwei Niu, Zhibo Wang, Caisen Chen
Journal  Security and Communication Networks Volume 7, Issue 10 (2014), p. 1488
Cloud identity management security issues & solutions: a taxonomy
Umme Habiba, Rahat Masood, Muhammad Awais Shibli, Muaz A Niazi
Journal  Complex Adaptive Systems Modeling Volume 2, Issue 1 (2014)
Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards
Marimuthu Karuppiah, R Saravanan
Journal  Journal of Discrete Mathematical Sciences and Cryptography Volume 18, Issue 5 (2015), p. 623
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
Xiong Li, Jian-Wei Niu, Jian Ma, Wen-Dong Wang, Cheng-Lian Liu
Journal  Journal of Network and Computer Applications Volume 34, Issue 1 (2011), p. 73
Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’
Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar
Journal  Computer Communications Volume 34, Issue 3 (2011), p. 305
Cryptanalysis of a modified remote user authentication scheme using smart cards
Kai-Chi Leung, L.M. Cheng, A.S. Fong, Chi-Kwong Chan
Journal  IEEE Transactions on Consumer Electronics Volume 49, Issue 4 (2003), p. 1243
Deep Learning-Based Malicious Illegal Traffic Identification
Shijun Zhang, Shuo Li, Jing Zeng
Book  Lecture Notes on Data Engineering and Communications Technologies (Proceedings of the 4th International Conference on Big Data Analytics for Cyber-Physical System in Smart City - Volume 2) Volume 168 (2023), p. 710
Efficient and secure dynamic ID‐based remote user authentication scheme for distributed systems using smart cards
Jenq‐Shiou Leu, Wen‐Bin Hsieh
Journal  IET Information Security Volume 8, Issue 2 (2014), p. 104
Efficient remote user authentication scheme based on generalized elgamal signature scheme
Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
Journal  IEEE Transactions on Consumer Electronics Volume 50, Issue 2 (2004), p. 568
Efficient remote user authentication scheme using smart card
Rongxing Lu, Zhenfu Cao
Journal  Computer Networks Volume 49, Issue 4 (2005), p. 535
IEEE International Conference on e-Business Engineering (ICEBE'07)
Wei-Chi Ku, Chun-Hao Hwang, Hao-Rung Chung
Conference  (2007), p. 406
Implementation of Improved DES Algorithm in Securing Smart Card Data
Ariel M. Sison, Bartolome T. Tanguilig, Bobby D. Gerardo, Yung-Cheol Byun
Book  Communications in Computer and Information Science (Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity) Volume 340 (2012), p. 252
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
Han-Cheng Hsiang, Wei-Kuan Shih
Journal  Computer Standards & Interfaces Volume 31, Issue 6 (2009), p. 1118
Improving the security of ‘a flexible biometrics remote user authentication scheme’
Muhammad Khurram Khan, Jiashu Zhang
Journal  Computer Standards & Interfaces Volume 29, Issue 1 (2007), p. 82
Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice
Kejun Chen, Shuai Zhang, Zhikun Li, Yi Zhang, Qingxu Deng, Sandip Ray, Yier Jin
Journal  Journal of Hardware and Systems Security Volume 2, Issue 2 (2018), p. 97
On the Analysis and Design of a Family Tree of Smart Card Based User Authentication Schemes
Raphael C. -W. Phan, Bok-Min Goi
Book  Lecture Notes in Computer Science (Ubiquitous Intelligence and Computing) Volume 4611 (2007), p. 1213
On weaknesses of the HDCP authentication and key exchange protocol and its repair
Jianjie Zhao, Dawu Gu, Yali Li, Wei Cheng
Journal  Mathematical and Computer Modelling Volume 55, Issue 1-2 (2012), p. 19
Remote Authentication with Forward Security
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
Book  Lecture Notes in Computer Science (Autonomic and Trusted Computing) Volume 4158 (2006), p. 418
Robust three‐factor remote user authentication scheme with key agreement for multimedia systems
Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao, Xiaoke Zhao
Journal  Security and Communication Networks Volume 9, Issue 13 (2016), p. 1916
SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks
Azeem Irshad, Mohammed Alreshoodi
Journal  IEEE Access (2024), p. 1
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Saru Kumari, Fan Wu, Shehzad Ashraf Chaudhry, R. Niranchana
Journal  Mobile Networks and Applications Volume 24, Issue 3 (2019), p. 1046
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments
Wansuck Yi, Seungjoo Kim, Dongho Won
Book  Lecture Notes in Computer Science (Computational Science and Its Applications – ICCSA 2009) Volume 5593 (2009), p. 182
TENCON 2007 - 2007 IEEE Region 10 Conference
Yi-Pin Liao, Shuenn-Shyang Wang
Conference  (2007), p. 1
The 5th Conference on Information and Knowledge Technology
Z. Zareh Hosseini, E. Barkhordari
Conference  (2013), p. 268
Threshold password authentication against guessing attacks in Ad hoc networks
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
Journal  Ad Hoc Networks Volume 5, Issue 7 (2007), p. 1046
Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture
Wei-Chi Ku
Journal  IEEE Transactions on Neural Networks Volume 16, Issue 4 (2005), p. 1002
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
Hao-Rung Chung, Wei-Chi Ku, Maw-Jinn Tsaur
Journal  Computer Standards & Interfaces Volume 31, Issue 4 (2009), p. 863