You are looking at a specific version 20100320:020118 of this paper.
See the latest version.
Paper 2010/148
Comments on five smart card based password authentication protocols
Yalin Chen , Jue-Sam Chou , , Chun-Hui Huang
Abstract
In this paper, we use the ten security requirements proposed by Liao et al. for a smart card based authentication protocol to examine five recent work in this area. After analyses, we found that the protocols of Juang et al.’s, Hsiang et al.’s, Kim et al.’s, and Li et al.’s all suffer from the password guessing attack if the smart card is lost and the protocol of Xu et al.’s suffers from the insider attack.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- password authentication protocolinsider attacksmart card lost problempassword guessing attack
- Contact author(s)
- jschou @ mail nhu edu tw
- History
- 2010-03-20: received
- Short URL
- https://ia.cr/2010/148
- License
-
CC BY