security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards安全分析和改进有效的biometric-based使用智能卡远程用户身份验证方案.pdfVIP
- 2
- 0
- 约 6页
- 2017-09-01 发布于上海
- 举报
security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards安全分析和改进有效的biometric-based使用智能卡远程用户身份验证方案
Hindawi Publishing Corporation
Journal of Biomedicine and Biotechnology
Volume 2012, Article ID 519723, 6 pages
doi:10.1155/2012/519723
Research Article
Security Analysis and Enhancements of an Effective
Biometric-Based Remote User Authentication Scheme Using
Smart Cards
Younghwa An
Division of Computer and Media Information Engineering, Kangnam University, 111, Gugal-dong, Giheung-gu, Yongin-si,
Gyounggi-do, 446-702, Republic of Korea
Correspondence should be addressed to Younghwa An, yhan@kangnam.ac.kr
Received 25 May 2012; Accepted 7 June 2012
Academic Editor: Sabah Mohammed
Copyright © 2012 Younghwa An. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security
weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme
using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das’s
authentication scheme, and we have shown that Das’s authentication scheme is still insecure against the various attacks. Also, we
proposed the enhanced scheme to remove these security problems of Das’s authentication scheme, even if the secret information
stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure
against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and
provides mutual authentication between the user and the server.
1. Introduct
您可能关注的文档
- on the brink how biology and humans affect extinction risk濒临灭绝生物和人类如何影响的风险.pdf
- on the measurement of movement difficulty in the standard approach to fitts' law运动困难的测量费茨定律模拟了标准的方法.pdf
- on the implications of a sex difference in the reaction times of sprinters at the beijing olympics性别差异的影响在短跑运动员在北京奥运会上的反应时间.pdf
- on the mechanism of gene amplification induced under stress in escherichia coli基因扩增诱导机制的压力下的大肠杆菌.pdf
- on the mechanics of cardiac function of drosophila embryo在果蝇胚胎的心脏功能的机制.pdf
- on the origin and spread of the scab disease of apple out of central asia痂的起源和传播疾病的苹果中亚.pdf
- on the origin of indonesian cattle在印尼牛的起源.pdf
- on the origin of the treponematoses a phylogenetic approachtreponematoses起源的一个系统的方法.pdf
- on genetic specificity in symbiont-mediated host-parasite coevolution在基因特异性symbiont-mediated开始共同进化.pdf
- on the ontology based representation of cell lines细胞系的基于本体的表示.pdf
最近下载
- 2023年江苏省常州市中考语文试卷附参考答案.pdf VIP
- 四川专升本数学2025年真题 及答案 .pdf VIP
- 2026年寒假特色作业模板【可编辑 可打印】.pptx
- 任务一短期投资的核算.ppt VIP
- 生物必修二全套课件.ppt VIP
- 2023年江苏省常州市中考语文试卷.docx VIP
- 2025年江苏高考地理真题(解析版).docx
- 2026年教案课件-中华民族共同体概论-第1-9讲-混一南北与中华民族大统合-教案合集-新版.pdf VIP
- 新解读《GB_T 39329-2020增材制造 测试方法 标准测试件精度检验》.docx VIP
- 医疗器械部门职责与岗位划分指南.docx VIP
原创力文档

文档评论(0)