English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90074/105197 (86%)
Visitors : 7159350      Online Users : 42
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 光電與通訊學系 > 期刊論文 >  Item 310904400/108342

    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/108342

    Title: Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme using Elliptic Curve Cryptosystems
    Authors: 李俊達;李正吉;Cheng-Chi Lee
    Contributors: 光電與通訊學系
    Date: 2017-05
    Issue Date: 2017-11-27 11:47:04 (UTC+8)
    Abstract: Nowadays users can access various online services and
    resources from distributed information systems remotely via Internet or
    other public networks. However, remote online systems are vulnerable to
    many security attacks due to they are built on public networks. Therefore
    it is necessary to design an authentication scheme for securing network
    communications between a login user and a remote server. In 2016, Han
    et al. proposed a secure three-factor authentication scheme based on
    elliptic curve cryptography (ECC) to achieve this goal. Unfortunately,
    we analyzed Han et al.’s scheme and demonstrated that their authentication
    scheme cannot satisfactory to be implemented in practice because
    it fails to ensure the property of unlinkability between the login user and
    the remote server and is unable to withstand account duplication attack.
    In this paper, we suggest an enhanced anonymous authentication scheme
    to repair the security flaws in Han et al.’s scheme. We give the security
    analysis and performance evaluation to demonstrate that the proposed
    scheme not only resists the aforementioned security weaknesses on Han
    et al.’s scheme but also inherits the functionality merits and performance
    efficiencies of their authentication scheme.
    Relation: Springer-Verlag Lecture Notes in Computer Science
    Appears in Collections:[光電與通訊學系] 期刊論文

    Files in This Item:

    File SizeFormat

    All items in ASIAIR are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback