Abstract | ||
---|---|---|
Password-based authentication has been used extensively as a one of authentication techniques. Wu et al. presented a robust password authentication technique, in which they can face guessing, stolen-verifier, replaying, and impersonation attacks. However, in this paper, we are going to show that Wu et al. protocol is vulnerable to theft attack and consequentially construct a modified authentication scheme to prevent the shortcomings as a recovery. Proposed technique maintains the Wu et al's security features as well as remedies its security weakness. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/CloudCom.2015.20 | CloudCom |
Keywords | Field | DocType |
communications security, theft attack, dynamic password authentication | Lightweight Extensible Authentication Protocol,Zero-knowledge password proof,Computer science,Computer security,Challenge–response authentication,S/KEY,One-time password,Password policy,Authentication protocol,Password | Conference |
ISSN | Citations | PageRank |
2330-2194 | 0 | 0.34 |
References | Authors | |
6 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mohamed Hamdy Eldefrawy | 1 | 42 | 5.40 |
Jalal F. Al-Muhtadi | 2 | 0 | 0.34 |