Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography
Recently, a password authentication and update scheme has been presented by Islam and Biswas to remove the security weaknesses in Lin and Huang’s scheme. Unfortunately, He et al., Wang et al., and Li have found out that Islam and Biswas’ improvement was vulnerable to offline password guessing attack...
Saved in:
Main Author: | Lili Wang |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | Journal of Applied Mathematics |
Online Access: | http://dx.doi.org/10.1155/2014/247836 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
by: Wumei ZHANG
Published: (2016-05-01) -
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
by: Yuehui CHEN, et al.
Published: (2016-05-01) -
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
by: Jie ZHAO, et al.
Published: (2016-06-01) -
Password authentication scheme for mobile computing environment
by: LIU Jun, et al.
Published: (2007-01-01) -
Efficient anonymous password-based authenticated key exchange scheme
by: TAN Shi-chong, et al.
Published: (2009-01-01)