Loading…

Analysis to Wen and Li's Scheme

In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonym...

Full description

Saved in:
Bibliographic Details
Main Authors: Chun-Hong Lin, Chao-Wen Chan
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 86
container_issue
container_start_page 82
container_title
container_volume
creator Chun-Hong Lin
Chao-Wen Chan
description In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonymity, a scheme claimed dynamic ID-based must propose to be had. in this paper, we improve its anonymity.
doi_str_mv 10.1109/ICGEC.2012.61
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6457264</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6457264</ieee_id><sourcerecordid>6457264</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-1f7500162113310bbf85448d0cd7bf96700002075fecd69a1464ab50aac94ef33</originalsourceid><addsrcrecordid>eNotjj1PwzAURY0QElAyMjHgjSnhPX-8F49VVEqlSAwtgq1yElsYtQHVXfrviUSnM91zjxD3CBUiuOdVs1w0lQJUFeGFuAUmZw2T_rwUheMaDbFWqGt3LYqcvwFg2pHS-kY8zke_O-WU5fFHfoRR-nGQbXrKct1_hX24E1fR73IozpyJ95fFpnkt27flqpm3ZUK2xxIj28lKClFrhK6LtTWmHqAfuIuOePoEBWxj6AdyfkoyvrPgfe9MiFrPxMO_N4UQtr-HtPeH05aMZUVG_wGfDTuO</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Analysis to Wen and Li's Scheme</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chun-Hong Lin ; Chao-Wen Chan</creator><creatorcontrib>Chun-Hong Lin ; Chao-Wen Chan</creatorcontrib><description>In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonymity, a scheme claimed dynamic ID-based must propose to be had. in this paper, we improve its anonymity.</description><identifier>ISBN: 9781467321389</identifier><identifier>ISBN: 1467321389</identifier><identifier>EISBN: 076954763X</identifier><identifier>EISBN: 9780769547633</identifier><identifier>DOI: 10.1109/ICGEC.2012.61</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Algorithm design and analysis ; Anonymity ; Authentication ; Collision-resistance ; Computer science ; Cryptography ; Dynamic ID ; Equations ; Servers ; Smart Card ; Smart cards</subject><ispartof>2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012, p.82-86</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6457264$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6457264$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chun-Hong Lin</creatorcontrib><creatorcontrib>Chao-Wen Chan</creatorcontrib><title>Analysis to Wen and Li's Scheme</title><title>2012 Sixth International Conference on Genetic and Evolutionary Computing</title><addtitle>icgec</addtitle><description>In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonymity, a scheme claimed dynamic ID-based must propose to be had. in this paper, we improve its anonymity.</description><subject>Algorithm design and analysis</subject><subject>Anonymity</subject><subject>Authentication</subject><subject>Collision-resistance</subject><subject>Computer science</subject><subject>Cryptography</subject><subject>Dynamic ID</subject><subject>Equations</subject><subject>Servers</subject><subject>Smart Card</subject><subject>Smart cards</subject><isbn>9781467321389</isbn><isbn>1467321389</isbn><isbn>076954763X</isbn><isbn>9780769547633</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjj1PwzAURY0QElAyMjHgjSnhPX-8F49VVEqlSAwtgq1yElsYtQHVXfrviUSnM91zjxD3CBUiuOdVs1w0lQJUFeGFuAUmZw2T_rwUheMaDbFWqGt3LYqcvwFg2pHS-kY8zke_O-WU5fFHfoRR-nGQbXrKct1_hX24E1fR73IozpyJ95fFpnkt27flqpm3ZUK2xxIj28lKClFrhK6LtTWmHqAfuIuOePoEBWxj6AdyfkoyvrPgfe9MiFrPxMO_N4UQtr-HtPeH05aMZUVG_wGfDTuO</recordid><startdate>201208</startdate><enddate>201208</enddate><creator>Chun-Hong Lin</creator><creator>Chao-Wen Chan</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201208</creationdate><title>Analysis to Wen and Li's Scheme</title><author>Chun-Hong Lin ; Chao-Wen Chan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-1f7500162113310bbf85448d0cd7bf96700002075fecd69a1464ab50aac94ef33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Algorithm design and analysis</topic><topic>Anonymity</topic><topic>Authentication</topic><topic>Collision-resistance</topic><topic>Computer science</topic><topic>Cryptography</topic><topic>Dynamic ID</topic><topic>Equations</topic><topic>Servers</topic><topic>Smart Card</topic><topic>Smart cards</topic><toplevel>online_resources</toplevel><creatorcontrib>Chun-Hong Lin</creatorcontrib><creatorcontrib>Chao-Wen Chan</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chun-Hong Lin</au><au>Chao-Wen Chan</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Analysis to Wen and Li's Scheme</atitle><btitle>2012 Sixth International Conference on Genetic and Evolutionary Computing</btitle><stitle>icgec</stitle><date>2012-08</date><risdate>2012</risdate><spage>82</spage><epage>86</epage><pages>82-86</pages><isbn>9781467321389</isbn><isbn>1467321389</isbn><eisbn>076954763X</eisbn><eisbn>9780769547633</eisbn><coden>IEEPAD</coden><abstract>In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonymity, a scheme claimed dynamic ID-based must propose to be had. in this paper, we improve its anonymity.</abstract><pub>IEEE</pub><doi>10.1109/ICGEC.2012.61</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781467321389
ispartof 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012, p.82-86
issn
language eng
recordid cdi_ieee_primary_6457264
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Algorithm design and analysis
Anonymity
Authentication
Collision-resistance
Computer science
Cryptography
Dynamic ID
Equations
Servers
Smart Card
Smart cards
title Analysis to Wen and Li's Scheme
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T09%3A39%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Analysis%20to%20Wen%20and%20Li's%20Scheme&rft.btitle=2012%20Sixth%20International%20Conference%20on%20Genetic%20and%20Evolutionary%20Computing&rft.au=Chun-Hong%20Lin&rft.date=2012-08&rft.spage=82&rft.epage=86&rft.pages=82-86&rft.isbn=9781467321389&rft.isbn_list=1467321389&rft.coden=IEEPAD&rft_id=info:doi/10.1109/ICGEC.2012.61&rft.eisbn=076954763X&rft.eisbn_list=9780769547633&rft_dat=%3Cieee_6IE%3E6457264%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-1f7500162113310bbf85448d0cd7bf96700002075fecd69a1464ab50aac94ef33%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6457264&rfr_iscdi=true