Loading…
Analysis to Wen and Li's Scheme
In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonym...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 86 |
container_issue | |
container_start_page | 82 |
container_title | |
container_volume | |
creator | Chun-Hong Lin Chao-Wen Chan |
description | In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonymity, a scheme claimed dynamic ID-based must propose to be had. in this paper, we improve its anonymity. |
doi_str_mv | 10.1109/ICGEC.2012.61 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6457264</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6457264</ieee_id><sourcerecordid>6457264</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-1f7500162113310bbf85448d0cd7bf96700002075fecd69a1464ab50aac94ef33</originalsourceid><addsrcrecordid>eNotjj1PwzAURY0QElAyMjHgjSnhPX-8F49VVEqlSAwtgq1yElsYtQHVXfrviUSnM91zjxD3CBUiuOdVs1w0lQJUFeGFuAUmZw2T_rwUheMaDbFWqGt3LYqcvwFg2pHS-kY8zke_O-WU5fFHfoRR-nGQbXrKct1_hX24E1fR73IozpyJ95fFpnkt27flqpm3ZUK2xxIj28lKClFrhK6LtTWmHqAfuIuOePoEBWxj6AdyfkoyvrPgfe9MiFrPxMO_N4UQtr-HtPeH05aMZUVG_wGfDTuO</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Analysis to Wen and Li's Scheme</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chun-Hong Lin ; Chao-Wen Chan</creator><creatorcontrib>Chun-Hong Lin ; Chao-Wen Chan</creatorcontrib><description>In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonymity, a scheme claimed dynamic ID-based must propose to be had. in this paper, we improve its anonymity.</description><identifier>ISBN: 9781467321389</identifier><identifier>ISBN: 1467321389</identifier><identifier>EISBN: 076954763X</identifier><identifier>EISBN: 9780769547633</identifier><identifier>DOI: 10.1109/ICGEC.2012.61</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Algorithm design and analysis ; Anonymity ; Authentication ; Collision-resistance ; Computer science ; Cryptography ; Dynamic ID ; Equations ; Servers ; Smart Card ; Smart cards</subject><ispartof>2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012, p.82-86</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6457264$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6457264$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chun-Hong Lin</creatorcontrib><creatorcontrib>Chao-Wen Chan</creatorcontrib><title>Analysis to Wen and Li's Scheme</title><title>2012 Sixth International Conference on Genetic and Evolutionary Computing</title><addtitle>icgec</addtitle><description>In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonymity, a scheme claimed dynamic ID-based must propose to be had. in this paper, we improve its anonymity.</description><subject>Algorithm design and analysis</subject><subject>Anonymity</subject><subject>Authentication</subject><subject>Collision-resistance</subject><subject>Computer science</subject><subject>Cryptography</subject><subject>Dynamic ID</subject><subject>Equations</subject><subject>Servers</subject><subject>Smart Card</subject><subject>Smart cards</subject><isbn>9781467321389</isbn><isbn>1467321389</isbn><isbn>076954763X</isbn><isbn>9780769547633</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjj1PwzAURY0QElAyMjHgjSnhPX-8F49VVEqlSAwtgq1yElsYtQHVXfrviUSnM91zjxD3CBUiuOdVs1w0lQJUFeGFuAUmZw2T_rwUheMaDbFWqGt3LYqcvwFg2pHS-kY8zke_O-WU5fFHfoRR-nGQbXrKct1_hX24E1fR73IozpyJ95fFpnkt27flqpm3ZUK2xxIj28lKClFrhK6LtTWmHqAfuIuOePoEBWxj6AdyfkoyvrPgfe9MiFrPxMO_N4UQtr-HtPeH05aMZUVG_wGfDTuO</recordid><startdate>201208</startdate><enddate>201208</enddate><creator>Chun-Hong Lin</creator><creator>Chao-Wen Chan</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201208</creationdate><title>Analysis to Wen and Li's Scheme</title><author>Chun-Hong Lin ; Chao-Wen Chan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-1f7500162113310bbf85448d0cd7bf96700002075fecd69a1464ab50aac94ef33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Algorithm design and analysis</topic><topic>Anonymity</topic><topic>Authentication</topic><topic>Collision-resistance</topic><topic>Computer science</topic><topic>Cryptography</topic><topic>Dynamic ID</topic><topic>Equations</topic><topic>Servers</topic><topic>Smart Card</topic><topic>Smart cards</topic><toplevel>online_resources</toplevel><creatorcontrib>Chun-Hong Lin</creatorcontrib><creatorcontrib>Chao-Wen Chan</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chun-Hong Lin</au><au>Chao-Wen Chan</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Analysis to Wen and Li's Scheme</atitle><btitle>2012 Sixth International Conference on Genetic and Evolutionary Computing</btitle><stitle>icgec</stitle><date>2012-08</date><risdate>2012</risdate><spage>82</spage><epage>86</epage><pages>82-86</pages><isbn>9781467321389</isbn><isbn>1467321389</isbn><eisbn>076954763X</eisbn><eisbn>9780769547633</eisbn><coden>IEEPAD</coden><abstract>In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonymity, a scheme claimed dynamic ID-based must propose to be had. in this paper, we improve its anonymity.</abstract><pub>IEEE</pub><doi>10.1109/ICGEC.2012.61</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781467321389 |
ispartof | 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012, p.82-86 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6457264 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Algorithm design and analysis Anonymity Authentication Collision-resistance Computer science Cryptography Dynamic ID Equations Servers Smart Card Smart cards |
title | Analysis to Wen and Li's Scheme |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T09%3A39%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Analysis%20to%20Wen%20and%20Li's%20Scheme&rft.btitle=2012%20Sixth%20International%20Conference%20on%20Genetic%20and%20Evolutionary%20Computing&rft.au=Chun-Hong%20Lin&rft.date=2012-08&rft.spage=82&rft.epage=86&rft.pages=82-86&rft.isbn=9781467321389&rft.isbn_list=1467321389&rft.coden=IEEPAD&rft_id=info:doi/10.1109/ICGEC.2012.61&rft.eisbn=076954763X&rft.eisbn_list=9780769547633&rft_dat=%3Cieee_6IE%3E6457264%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-1f7500162113310bbf85448d0cd7bf96700002075fecd69a1464ab50aac94ef33%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6457264&rfr_iscdi=true |