Authors
Mohammed Misbahuddin, Mohammed Aijaz Ahmed, MH Shastri
Publication date
2006/11/19
Conference
2006 Innovations in Information Technology
Pages
1-5
Publisher
IEEE
Description
The password based authentication schemes are commonly used for authenticating remote users. Many password based schemes both with and without smart card have been proposed; each scheme has its merits and demerits. In this paper we propose an efficient scheme for remote user authentication which does not maintain verifier table and allows the user to freely choose and change their passwords. Also the proposed scheme achieves mutual authentication which is essential for many applications. The scheme is secure against id theft, guessing attack, insider attack, stolen verifier attack, replay attack, impersonation attack, and reflection attack
Total citations
2008200920102011201220132014201520162017201820192020202151111131131
Scholar articles
M Misbahuddin, MA Ahmed, MH Shastri - 2006 Innovations in Information Technology, 2006