A remote user authentication scheme without using smart cards
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rhee, Hyun Sook | - |
dc.contributor.author | Kwon, Jeong Ok | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-08T21:01:25Z | - |
dc.date.available | 2021-09-08T21:01:25Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2009-01 | - |
dc.identifier.issn | 0920-5489 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/120801 | - |
dc.description.abstract | User authentication is one of the fundamental procedures to ensure Secure communications over an insecure public network channel. Especially, due to tamper-resistance and convenience in managing a password file, various user authentication schemes using smart cards have been proposed. A smart card however far from ubiquitous because of the high cost of a smart card and the infrastructure requirements. In this paper, we study secure user authentication using only a common storage device such as a universal serial bus (USB) memory, instead of using smart cards. We first show that the existing schemes using smart cards cannot be immediately converted into schemes using a common storage device. We then propose a practical and secure user authentication scheme, capable of supporting the use of the common storage device, which retains all the advantages of schemes using smart cards. (C) 2007 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.subject | SECURITY ENHANCEMENT | - |
dc.subject | CRYPTANALYSIS | - |
dc.title | A remote user authentication scheme without using smart cards | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1016/j.csi.2007.11.017 | - |
dc.identifier.scopusid | 2-s2.0-54349125537 | - |
dc.identifier.wosid | 000261466600002 | - |
dc.identifier.bibliographicCitation | COMPUTER STANDARDS & INTERFACES, v.31, no.1, pp.6 - 13 | - |
dc.relation.isPartOf | COMPUTER STANDARDS & INTERFACES | - |
dc.citation.title | COMPUTER STANDARDS & INTERFACES | - |
dc.citation.volume | 31 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 6 | - |
dc.citation.endPage | 13 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | SECURITY ENHANCEMENT | - |
dc.subject.keywordPlus | CRYPTANALYSIS | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | User authentication | - |
dc.subject.keywordAuthor | Password | - |
dc.subject.keywordAuthor | Smart card | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.