Password authentication scheme for mobile computing environment

By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,t...

Full description

Saved in:
Bibliographic Details
Main Authors: LIU Jun, LIAO Jian-xin, ZHU Xiao-min, WANG Chun
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2007-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74659116/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537435127775232
author LIU Jun
LIAO Jian-xin
ZHU Xiao-min
WANG Chun
author_facet LIU Jun
LIAO Jian-xin
ZHU Xiao-min
WANG Chun
author_sort LIU Jun
collection DOAJ
description By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.
format Article
id doaj-art-24148aafb4704f94941712871404e769
institution Kabale University
issn 1000-436X
language zho
publishDate 2007-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-24148aafb4704f94941712871404e7692025-01-14T08:36:02ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2007-01-01364274659116Password authentication scheme for mobile computing environmentLIU JunLIAO Jian-xinZHU Xiao-minWANG ChunBy means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.http://www.joconline.com.cn/zh/article/74659116/authenticationkey establishmentpasswordqueuing modelperformance analysisTLSRSA
spellingShingle LIU Jun
LIAO Jian-xin
ZHU Xiao-min
WANG Chun
Password authentication scheme for mobile computing environment
Tongxin xuebao
authentication
key establishment
password
queuing model
performance analysis
TLS
RSA
title Password authentication scheme for mobile computing environment
title_full Password authentication scheme for mobile computing environment
title_fullStr Password authentication scheme for mobile computing environment
title_full_unstemmed Password authentication scheme for mobile computing environment
title_short Password authentication scheme for mobile computing environment
title_sort password authentication scheme for mobile computing environment
topic authentication
key establishment
password
queuing model
performance analysis
TLS
RSA
url http://www.joconline.com.cn/zh/article/74659116/
work_keys_str_mv AT liujun passwordauthenticationschemeformobilecomputingenvironment
AT liaojianxin passwordauthenticationschemeformobilecomputingenvironment
AT zhuxiaomin passwordauthenticationschemeformobilecomputingenvironment
AT wangchun passwordauthenticationschemeformobilecomputingenvironment