完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Yang, CC | en_US |
dc.contributor.author | Wang, RC | en_US |
dc.contributor.author | Chang, TY | en_US |
dc.date.accessioned | 2014-12-08T15:19:30Z | - |
dc.date.available | 2014-12-08T15:19:30Z | - |
dc.date.issued | 2005-03-25 | en_US |
dc.identifier.issn | 0096-3003 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1016/j.amc.2004.03.017 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/13886 | - |
dc.description.abstract | Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed Out that Yang and Shieh's timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yell pointed Out that Chan and Cheng's attack was unreasonable. At the same time, Sun and Yell pointed out that Yang and Shieh's password authentication schemes were still Vulnerable to the forgery attack. In this paper, we shall improve Yang and Shieh's schemes to resist Sun and Yell's attack. (C) 2004 Elsevier Inc. All rights reserved. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | authentication | en_US |
dc.subject | forgery attack | en_US |
dc.subject | password | en_US |
dc.subject | smart card | en_US |
dc.title | An improvement of the Yang-Shieh password authentication schemes | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/j.amc.2004.03.017 | en_US |
dc.identifier.journal | APPLIED MATHEMATICS AND COMPUTATION | en_US |
dc.citation.volume | 162 | en_US |
dc.citation.issue | 3 | en_US |
dc.citation.spage | 1391 | en_US |
dc.citation.epage | 1396 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000226860100031 | - |
dc.citation.woscount | 16 | - |
顯示於類別: | 期刊論文 |