Title
Time-bounded based password authentication scheme
Abstract
Most computers are linked together such that facilities can be shared through the connection of networks. However, resources provided by remote servers over the Internet are not free for all users. If someone wants to access facilities from certain remote server, he/she has to pay for the access request. On the other hand, providers of the facilities have to make their resources accessible under appropriate protection. The combination of password authentication scheme and key agreement mechanism is a practical solution for validating remote users and providing secure communications between a remote system and login users. Without loss of generality, users who want to access a remote server must pass several examinations in the process of authentication. Only after users are authorized by the remote system, they can have the access right to resources provided by the remote server and share a session key with the remote system to ensure the following communications; otherwise, the remote system can reject their access requests. Researchers have proposed lots of password authentication schemes to improve the authentication efficiency and security, so that password authentication has become a popular research topic recently. Employing a time-bounded mechanism, this article describes a novel version which not only achieves the requirements of general password authentication schemes but also allows the remote system to effectively conduct the valid access phase of each legitimate user
Year
DOI
Venue
2005
10.1109/CW.2005.90
CW
Keywords
Field
DocType
authentication,password authentication scheme,authentication efficiency,remote user,access right,cryptography,key agreement mechanism,access requests,remote user validation,remote servers,access request,time-bounded,authorisation,internet,general password authentication scheme,secure communications,time-bounded based password authentication,resource access,certain remote server,session key,remote system,remote server,password authentication,secure communication
Computer access control,Password strength,Computer security,Computer science,Challenge–response authentication,S/KEY,One-time password,Authentication protocol,Password policy,Password
Conference
ISBN
Citations 
PageRank 
0-7695-2378-1
0
0.34
References 
Authors
14
3
Name
Order
Citations
PageRank
Chin Chen Chang17849725.95
Jui-Yi Kuo2232.26
Jung-San Lee335330.52