Cited by 62
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards

2017 International Conference on Information Technology (ICIT)
Kumar Sekhar Roy, Hemanta Kumar Kalita
Conference:  (2017), p. 202
2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing
Chin-Ling Chen, Yu-Fan Lin, Neng-Chung Wang, Young-Long Chen
Conference:  (2011), p. 53
2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Jianbin Li, Kwok-Yan Lam, Hong-Wei Sun, Siu-Leung Chung
Conference:  (2008), p. 1113
An Improved Lu-Cao’s Remote User Authentication Scheme Using Smart Card
Eun-Jun Yoon, Kee-Young Yoo
Book:  Lecture Notes in Computer Science (Public Key Infrastructure) Volume 4043 (2006), p. 45
2011 Ninth International Conference on Software Engineering Research, Management and Applications
Ariel M. Sison, Bartolome T. Tanguilig III, Bobby D. Gerardo, Yung-Cheol Byun
Conference:  (2011), p. 113
A Smart Card Based Lightweight Multi Server Encryption Scheme
Pranav Vyas
Book:  Communications in Computer and Information Science (Soft Computing and its Engineering Applications) Volume 1374 (2021), p. 212
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments
Wansuck Yi, Seungjoo Kim, Dongho Won
Book:  Lecture Notes in Computer Science (Computational Science and Its Applications – ICCSA 2009) Volume 5593 (2009), p. 182
2009 Third International Conference on Network and System Security
Muhammad Khurram Khan
Conference:  (2009), p. 420
2013 International Symposium on Biometrics and Security Technologies
Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao
Conference:  (2013), p. 105
2008 Workshop on Power Electronics and Intelligent Transportation System
Jianyan Geng, Lijiang Zhang
Conference:  (2008), p. 33
2008 International Conference on Convergence and Hybrid Information Technology
Lijiang Zhang, Puwen Wei
Conference:  (2008), p. 257
Deep Learning-Based Malicious Illegal Traffic Identification
Shijun Zhang, Shuo Li, Jing Zeng
Book:  Lecture Notes on Data Engineering and Communications Technologies (Proceedings of the 4th International Conference on Big Data Analytics for Cyber-Physical System in Smart City - Volume 2) Volume 168 (2023), p. 710
2007 International Conference on Information and Emerging Technologies
Muhammad Khurram Khan
Conference:  (2007), p. 1
2007 International Conference on Communications, Circuits and Systems
Hong-Wei Sun, Kwok-Yan Lam, Ming Gu, Jia-Guang Sun
Conference:  (2007), p. 476
2007 International Conference on Communications, Circuits and Systems
Hong-Wei Sun, Kwok-Yan Lam, Ming Gu, Jia-Guang Sun
Conference:  (2007), p. 472
2008 International Symposium on Biometrics and Security Technologies
Muhammad Khurram Khan
Conference:  (2008), p. 1
The 5th Conference on Information and Knowledge Technology
Z. Zareh Hosseini, E. Barkhordari
Conference:  (2013), p. 268
2008 Eighth International Conference on Intelligent Systems Design and Applications
Wen-Bing Horng, Cheng-Ping Lee
Conference:  (2008), p. 297
2008 ISECS International Colloquium on Computing, Communication, Control, and Management
Lijiang Zhang, Puwen Wei
Conference:  (2008), p. 419
IEEE International Conference on e-Business Engineering (ICEBE'07)
Wei-Chi Ku, Chun-Hao Hwang, Hao-Rung Chung
Conference:  (2007), p. 406
An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards
Muhammad Khurram Khan, Jiashu Zhang
Book:  Lecture Notes in Computer Science (Information Security Practice and Experience) Volume 3903 (2006), p. 260
Implementation of Improved DES Algorithm in Securing Smart Card Data
Ariel M. Sison, Bartolome T. Tanguilig, Bobby D. Gerardo, Yung-Cheol Byun
Book:  Communications in Computer and Information Science (Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity) Volume 340 (2012), p. 252
On the Analysis and Design of a Family Tree of Smart Card Based User Authentication Schemes
Raphael C. -W. Phan, Bok-Min Goi
Book:  Lecture Notes in Computer Science (Ubiquitous Intelligence and Computing) Volume 4611 (2007), p. 1213
2008 International Conference on Information Security and Assurance (isa 2008)
Jing Xu, Wen-Tao Zhu, Deng-Guo Feng
Conference:  (2008), p. 87
2010 10th International Conference on Intelligent Systems Design and Applications
Chun-Ta Li, Chen-Ju Liu, Cheng-Chi Lee, Chin-Wen Lee
Conference:  (2010), p. 1382
TENCON 2007 - 2007 IEEE Region 10 Conference
Yi-Pin Liao, Shuenn-Shyang Wang
Conference:  (2007), p. 1
2008 Third International Conference on Communications and Networking in China
Wei-Chi Ku, Hao-Rung Chung, Maw-Jinn Tsaur, Szu-Yao Wang
Conference:  (2008), p. 1275
2007 International Conference on Communications, Circuits and Systems
Tang Anyang, Xu Chunxiang
Conference:  (2007), p. 484
2005 Pakistan Section Multitopic Conference
Muhammad Khurram Khan, Jiashu Zhang
Conference:  (2005), p. 1
Remote Authentication with Forward Security
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
Book:  Lecture Notes in Computer Science (Autonomic and Trusted Computing) Volume 4158 (2006), p. 418
2006 International Conference on Machine Learning and Cybernetics
Xue-guang Wang, Zhen-chuan Chai
Conference:  (2006), p. 2653
A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce
Amit K. Awasthi, Keerti Srivastava
Journal:  Journal of Medical Systems Volume 37, Issue 5 (2013)
A Novel Multi-Server Authentication Scheme for e-commerce Applications Using Smart Card
Kakali Chatterjee, Asok De
Journal:  Wireless Personal Communications Volume 91, Issue 1 (2016), p. 293
A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card
Jangirala Srinivas, Sourav Mukhopadhyay, Dheerendra Mishra
Journal:  Wireless Personal Communications Volume 96, Issue 4 (2017), p. 6273
A dynamic identity‐based user authentication scheme for remote login systems
Chun‐Ta Li, Cheng‐Chi Lee, Chi‐Yao Weng
Journal:  Security and Communication Networks Volume 8, Issue 18 (2015), p. 3372
A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients
Yi-Pin Liao, Chih-Ming Hsiao
Journal:  Future Generation Computer Systems Volume 29, Issue 3 (2013), p. 886
A secure dynamic ID based remote user authentication scheme for multi-server environment
Yi-Pin Liao, Shuenn-Shyang Wang
Journal:  Computer Standards & Interfaces Volume 31, Issue 1 (2009), p. 24
A secure remote user mutual authentication scheme using smart cards
Marimuthu Karuppiah, R. Saravanan
Journal:  Journal of Information Security and Applications Volume 19, Issue 4-5 (2014), p. 282
An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks
Tsu-Yang Wu, Zhiyuan Lee, Mohammad S. Obaidat, Saru Kumari, Sachin Kumar, Chien-Ming Chen
Journal:  IEEE Access Volume 8 (2020), p. 28096
An Improved Mutual Authentication Mechanism for Securing Smart Phones
Wen-Bin Hsieh, Jenq-Shiou Leu
Journal:  Wireless Personal Communications Volume 97, Issue 2 (2017), p. 2911
An Improvement on Remote User Authentication Schemes Using Smart Cards
Chin-Ling Chen, Yong-Yuan Deng, Yung-Wen Tang, Jung-Hsuan Chen, Yu-Fan Lin
Journal:  Computers Volume 7, Issue 1 (2018), p. 9
An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures
Wen-Bin Hsieh, Jenq-Shiou Leu
Journal:  The Journal of Supercomputing Volume 70, Issue 1 (2014), p. 133
An enhanced remote user authentication scheme using smart cards
A.K. Awasthi, S. Lal
Journal:  IEEE Transactions on Consumer Electronics Volume 50, Issue 2 (2004), p. 583
Applying biometrics to design three‐factor remote user authentication scheme with key agreement
Xiong Li, Jianwei Niu, Zhibo Wang, Caisen Chen
Journal:  Security and Communication Networks Volume 7, Issue 10 (2014), p. 1488
Cloud identity management security issues & solutions: a taxonomy
Umme Habiba, Rahat Masood, Muhammad Awais Shibli, Muaz A Niazi
Journal:  Complex Adaptive Systems Modeling Volume 2, Issue 1 (2014)
Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards
Marimuthu Karuppiah, R Saravanan
Journal:  Journal of Discrete Mathematical Sciences and Cryptography Volume 18, Issue 5 (2015), p. 623
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
Xiong Li, Jian-Wei Niu, Jian Ma, Wen-Dong Wang, Cheng-Lian Liu
Journal:  Journal of Network and Computer Applications Volume 34, Issue 1 (2011), p. 73
Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’
Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar
Journal:  Computer Communications Volume 34, Issue 3 (2011), p. 305
Cryptanalysis of a modified remote user authentication scheme using smart cards
Kai-Chi Leung, L.M. Cheng, A.S. Fong, Chi-Kwong Chan
Journal:  IEEE Transactions on Consumer Electronics Volume 49, Issue 4 (2003), p. 1243
Efficient and secure dynamic ID‐based remote user authentication scheme for distributed systems using smart cards
Jenq‐Shiou Leu, Wen‐Bin Hsieh
Journal:  IET Information Security Volume 8, Issue 2 (2014), p. 104
Efficient remote user authentication scheme based on generalized elgamal signature scheme
Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
Journal:  IEEE Transactions on Consumer Electronics Volume 50, Issue 2 (2004), p. 568
Efficient remote user authentication scheme using smart card
Rongxing Lu, Zhenfu Cao
Journal:  Computer Networks Volume 49, Issue 4 (2005), p. 535
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
Han-Cheng Hsiang, Wei-Kuan Shih
Journal:  Computer Standards & Interfaces Volume 31, Issue 6 (2009), p. 1118
Improving the security of ‘a flexible biometrics remote user authentication scheme’
Muhammad Khurram Khan, Jiashu Zhang
Journal:  Computer Standards & Interfaces Volume 29, Issue 1 (2007), p. 82
Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice
Kejun Chen, Shuai Zhang, Zhikun Li, Yi Zhang, Qingxu Deng, Sandip Ray, Yier Jin
Journal:  Journal of Hardware and Systems Security Volume 2, Issue 2 (2018), p. 97
On weaknesses of the HDCP authentication and key exchange protocol and its repair
Jianjie Zhao, Dawu Gu, Yali Li, Wei Cheng
Journal:  Mathematical and Computer Modelling Volume 55, Issue 1-2 (2012), p. 19
Robust three‐factor remote user authentication scheme with key agreement for multimedia systems
Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao, Xiaoke Zhao
Journal:  Security and Communication Networks Volume 9, Issue 13 (2016), p. 1916
SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks
Azeem Irshad, Mohammed Alreshoodi
Journal:  IEEE Access (2024), p. 1
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Saru Kumari, Fan Wu, Shehzad Ashraf Chaudhry, R. Niranchana
Journal:  Mobile Networks and Applications Volume 24, Issue 3 (2019), p. 1046
Threshold password authentication against guessing attacks in Ad hoc networks
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
Journal:  Ad Hoc Networks Volume 5, Issue 7 (2007), p. 1046
Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture
Wei-Chi Ku
Journal:  IEEE Transactions on Neural Networks Volume 16, Issue 4 (2005), p. 1002
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
Hao-Rung Chung, Wei-Chi Ku, Maw-Jinn Tsaur
Journal:  Computer Standards & Interfaces Volume 31, Issue 4 (2009), p. 863