Paper Title:
Comment on Xu et al.'s Key Agreement and Password Authentication Protocol
  Abstract

The Internet has been population, which it was implement information technology, to every enterprize, also changed their contact mode of information flow style. Since public key conception was proposed, it had authentication function to secure while they are communication, and defense the data to leak based on stranger. In 2010, Xu et al. proposed an improvement of generalized key agreement and password authentication protocol which it based on linear equation in two unknown of congruence. In this paper, we pointed out some errors. Thus, the Xu et al.'s improved scheme may not becomes to be correction

  Info
Periodical
Chapter
Chapter 7: Computer Application in Design and Manufacturing (1)
Edited by
Dongye Sun, Wen-Pei Sung and Ran Chen
Pages
3847-3849
DOI
10.4028/www.scientific.net/AMM.121-126.3847
Citation
Y. N. Guo, C. L. Liu, "Comment on Xu et al.'s Key Agreement and Password Authentication Protocol", Applied Mechanics and Materials, Vols. 121-126, pp. 3847-3849, 2012
Online since
October 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Li Hua Zhang, Li Ping Zhang, Er Fei Bai
Abstract:Recently, several one time password authentication schemes have been proposed. However, most one-time password authentication schemes have...
1503
Authors: Yung Cheng Lee
Abstract:The well-known password authentication mechanisms are widely used in networks to protect resources from unauthorized access. The ad hoc...
915
Authors: Chao Jing
Micro-Electronic Packaging Technology and Equipment
Abstract:Increasing number of network applications require authentication of the user's identity which is the first step to ensure security. This...
1791
Authors: Young Hwa An
Abstract:In 2008, Bindu et al. proposed an improvement to Chien et al.'s remote password authentication scheme preserving user anonymity, and has...
184
Authors: Hui Liu
Chapter 10: Applied Computing and Information Technologies
Abstract:To access resources from a remote system, the user authentication is a very important security mechanism. Among remote authentication...
2182