<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232014000600006</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Improvement of the EIGamal Based Remote Authentication Scheme Using Smart Cards]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Yung-Cheng]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hsieh]]></surname>
<given-names><![CDATA[Yi-Chih]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Pei-Ju]]></given-names>
</name>
<xref ref-type="aff" rid="A03"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[You]]></surname>
<given-names><![CDATA[Peng-Sheng]]></given-names>
</name>
<xref ref-type="aff" rid="A04"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,WuFeng University Department of Security Technology and Management ]]></institution>
<addr-line><![CDATA[Chiayi ]]></addr-line>
<country>Taiwán</country>
</aff>
<aff id="A02">
<institution><![CDATA[,National Formosa University Department of Industrial Management ]]></institution>
<addr-line><![CDATA[Yunlin ]]></addr-line>
<country>Taiwán</country>
</aff>
<aff id="A03">
<institution><![CDATA[,University of Pittsburgh School of Information Science and Technology ]]></institution>
<addr-line><![CDATA[Pittsburgh Pennsylvania]]></addr-line>
<country>Estados Unidos de América</country>
</aff>
<aff id="A04">
<institution><![CDATA[,National Chiayi University Graduate Institute of Marketing and Logistics/Transportation ]]></institution>
<addr-line><![CDATA[Taiwan ]]></addr-line>
<country>China</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2014</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2014</year>
</pub-date>
<volume>12</volume>
<numero>6</numero>
<fpage>1063</fpage>
<lpage>1072</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232014000600006&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232014000600006&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232014000600006&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Nowadays, we can easily obtain variety of services through networks. But due to the open environment, networks are vulnerable to many security threats. The remote user authentication scheme is one of the most widely used mechanisms for servers to authorize users to access the services. In 2009, Ramasamy and Muniyandi proposed a discrete logarithm based remote authentication scheme with smart cards. Their scheme provides mutual authentication and withstands the denial of service attack, forgery attack and parallel session attack. In this article, we show that their scheme is not a practical solution for remote access. It lacks key agreement mechanism and users cannot choose or update passwords freely. Moreover, their scheme cannot resist the stolen-verifier attack, off-line guessing attack, impersonation attack and smart-card-loss-attack. We propose an improved scheme to remedy the drawbacks. The improved scheme has the merits of providing mutual authentication and key agreement, while forward and backward secrecy are ensured as well. The users can choose and update their passwords freely. Furthermore, the scheme can also withstand many attacks such as the smart-card-loss-attack, the replay attack, the off-line guessing attack, the insider attack, the impersonation attack and the parallel session attack.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Remote authentication]]></kwd>
<kwd lng="en"><![CDATA[smart cards]]></kwd>
<kwd lng="en"><![CDATA[discrete logarithm problem]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="center"><font face="verdana" size="4"><b>Improvement of the EIGamal Based Remote Authentication Scheme Using Smart Cards</b></font></p>  	    <p>&nbsp;</p>  	    <p align="center"><font face="verdana" size="2"><b>Yung&#45;Cheng Lee*<sup>1</sup>, Yi&#45;Chih Hsieh<sup>2</sup>, Pei&#45;Ju Lee<sup>3</sup> and Peng&#45;Sheng You<sup>4</sup></b></font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><sup><i>1</i></sup> <i>Department of Security Technology and Management, WuFeng University, Chiayi, Taiwan.</i> *<a href="mailto:yclee@wfu.edu.tw">yclee@wfu.edu.tw</a>.</font></p>  	    <p align="justify"><font face="verdana" size="2"><sup><i>2</i></sup> <i>Department of Industrial Management, National Formosa University, Yunlin, Taiwan.</i></font></p>  	    <p align="justify"><font face="verdana" size="2"><sup><i>3</i></sup> <i>School of Information Science and Technology, University of Pittsburgh, 135 N Bellefield, Pittsburgh, PA 15260.</i></font></p>  	    <p align="justify"><font face="verdana" size="2"><sup><i>4</i></sup> <i>Graduate Institute of Marketing and Logistics/Transportation, National Chiayi University, Chiayi, Taiwan.</i></font></p>  	    <p>&nbsp;</p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Nowadays, we can easily obtain variety of services through networks. But due to the open environment, networks are vulnerable to many security threats. The remote user authentication scheme is one of the most widely used mechanisms for servers to authorize users to access the services. In 2009, Ramasamy and Muniyandi proposed a discrete logarithm based remote authentication scheme with smart cards. Their scheme provides mutual authentication and withstands the denial of service attack, forgery attack and parallel session attack. In this article, we show that their scheme is not a practical solution for remote access. It lacks key agreement mechanism and users cannot choose or update passwords freely. Moreover, their scheme cannot resist the stolen&#45;verifier attack, off&#45;line guessing attack, impersonation attack and smart&#45;card&#45;loss&#45;attack. We propose an improved scheme to remedy the drawbacks. The improved scheme has the merits of providing mutual authentication and key agreement, while forward and backward secrecy are ensured as well. The users can choose and update their passwords freely. Furthermore, the scheme can also withstand many attacks such as the smart&#45;card&#45;loss&#45;attack, the replay attack, the off&#45;line guessing attack, the insider attack, the impersonation attack and the parallel session attack.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Remote authentication, smart cards, discrete logarithm problem.</font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/jart/v12n6/v12n6a6.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><b><i>Aknowledgments</i></b></font></p>  	    <p align="justify"><font face="verdana" size="2">This work was partially supported by the National Science Council of the Republic of China under the contract number NSC 101&#45;2632&#45;E&#45;274&#45;001&#45;MY3.</font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><b><i>References</i></b></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; C. C. Chang and T. C. Wu, "Remote password authentication with smart cards," IEE Proc E&#45; Comput Digit Tech, vol. 138, no. 3, pp. 165&#45;168, 1991.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852379&pid=S1665-6423201400060000600001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; B. T. Hsieh et al., "On the security of some password authentication protocols," Informatica, vol. 14, no. 2, pp. 195&#45;204, 2003.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852381&pid=S1665-6423201400060000600002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE T Consum Electr, vol. 1, no. 46, pp. 28&#45;30, 2000.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852383&pid=S1665-6423201400060000600003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; C. W. Lin et al., "A new strong password authentication scheme using one&#45;way hash functions," J Comput Sys Sc Int, vol. 45, no. 4, pp. 623&#45;626, 2006.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852385&pid=S1665-6423201400060000600004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; X. Tian et al., "Improved efficient remote user authentication schemes," Int J Net Sec, vol. 4, no. 2, pp. 149&#45;154, 2007.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852387&pid=S1665-6423201400060000600005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; W. H. Yang and S. P. Shieh, "Password authentication schemes with smart card," COMPSEC, vol. 8, no. 18, pp. 727&#45;733, 1999.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852389&pid=S1665-6423201400060000600006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; E. J. Yoon et al., "Further improvement of an efficient password based remote user authentication scheme using smart cards," IEEE T Consum Electr, vol. 50, no. 2, pp. 612&#45;614, 2004.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852391&pid=S1665-6423201400060000600007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; R. Martinez&#45;Pel&agrave;ez et al., "Security improvement of two dynamic ID&#45;based authentication schemes by Sood&#45;Sarje&#45;Singh," J Appl Res Technol, vol. 11, no. 5, pp. 755&#45;763, Oct. 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852393&pid=S1665-6423201400060000600008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; M. Kumar, "Some remarks on a remote user authentication scheme using smart cards with forward secrecy," IEEE T Consum Electr, vol. 50, no. 2, pp. 615&#45;618, 2004.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852395&pid=S1665-6423201400060000600009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; H. Y. Chien et al., "An efficient and practical solution to remote authentication: smart card," COMPSEC, vol. 4, no. 21, pp. 372&#45;375, 2002.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852397&pid=S1665-6423201400060000600010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; H. C. Hsiang and W. K. Shih, "Weaknesses and improvements of the Yoon&#45;Ryu&#45;Yoo remote user authentication scheme using smart cards," Comput Commun, vol. 32, no. 4, pp. 649&#45;652, 2009.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852399&pid=S1665-6423201400060000600011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; W. C. Ku and S. M. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE T Consum Electr, vol. 50, no. 1, pp. 204&#45;207, 2004.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852401&pid=S1665-6423201400060000600012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; R. Ramasamy, A. P. Muniyandi, "New remote mutual authentication scheme using smart cards," T data privacy, vol. 2, pp. 141&#45;152, 2009.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852403&pid=S1665-6423201400060000600013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; L. Lamport, "Password authentication with insecure communication," Commun ACM, vol. 24, no. 11, pp. 770&#45;772, 1981.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852405&pid=S1665-6423201400060000600014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE T Consum Electr, vol. 46, no. 1, pp. 28&#45;30, 2000.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852407&pid=S1665-6423201400060000600015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;16&#93; T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE T Inform Theory, vol. 31, no. 4, pp. 469&#45;472, 1985.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852409&pid=S1665-6423201400060000600016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;17&#93; C. K. Chan and L. M. Cheng, "Cryptanalysis of a remote user authentication scheme using smart cards," IEEE T Consum Electr, vol. 46, pp. 992&#45;993, 2000.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852411&pid=S1665-6423201400060000600017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;18&#93; J. J. Shen et al., "A modified remote user authentication scheme using smart cards," IEEE T Consum Electr, vol. 49, no. 2, pp. 414&#45;416, 2003.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852413&pid=S1665-6423201400060000600018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;19&#93; K. C. Leung et al., "Cryptanalysis of a remote user authentication scheme using smart cards", IEEE T Consum Electr, vol. 49, no. 4, pp. 1243&#45;1245, 2003.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852415&pid=S1665-6423201400060000600019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;20&#93; A. K. Awasthi and S. Lal, "A remote user authentication scheme using smarts cards with forward secrecy," IEEE T Consum Electr, vol. 49, no. 4, pp. 1246&#45;1248, 2003.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852417&pid=S1665-6423201400060000600020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;21&#93; E. J. Yoon et al., "Efficient remote user authentication scheme based on generalized ElGamal signature scheme," IEEE T Consum Electr, vol. 50, no. 2, pp. 568&#45;570, 2004.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852419&pid=S1665-6423201400060000600021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;22&#93; X. Tian et al., "Improved efficient remote user authentication schemes," Int J Net Sec, vol.4, no.2, pp.149&#45;154, 2007.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852421&pid=S1665-6423201400060000600022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;23&#93; Y. C. Lee, "Smart &#45; card &#45; loss &#45; attack and improvement of Hsiang et al.'s authentication scheme," J Appl Res Technol, vol. 11, no. 4, pp. 597&#45;603, Aug. 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852423&pid=S1665-6423201400060000600023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[C. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[T. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Remote password authentication with smart cards]]></article-title>
<source><![CDATA[IEE Proc E- Comput Digit Tech]]></source>
<year>1991</year>
<volume>138</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>165-168</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hsieh]]></surname>
<given-names><![CDATA[B. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[On the security of some password authentication protocols]]></article-title>
<source><![CDATA[Informatica]]></source>
<year>2003</year>
<volume>14</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>195-204</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hwang]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[L. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A new remote user authentication scheme using smart cards]]></article-title>
<source><![CDATA[IEEE T Consum Electr]]></source>
<year>2000</year>
<volume>1</volume>
<numero>46</numero>
<issue>46</issue>
<page-range>28-30</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[C. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A new strong password authentication scheme using one-way hash functions]]></article-title>
<source><![CDATA[J Comput Sys Sc Int]]></source>
<year>2006</year>
<volume>45</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>623-626</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tian]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Improved efficient remote user authentication schemes]]></article-title>
<source><![CDATA[Int J Net Sec]]></source>
<year>2007</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>149-154</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[W. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Shieh]]></surname>
<given-names><![CDATA[S. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Password authentication schemes with smart card]]></article-title>
<source><![CDATA[COMPSEC]]></source>
<year>1999</year>
<volume>8</volume>
<numero>18</numero>
<issue>18</issue>
<page-range>727-733</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yoon]]></surname>
<given-names><![CDATA[E. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[ther improvement of an efficient password based remote user authentication scheme using smart cards]]></article-title>
<source><![CDATA[IEEE T Consum Electr]]></source>
<year>2004</year>
<volume>50</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>612-614</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martinez-Pelàez]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Security improvement of two dynamic ID-based authentication schemes by Sood-Sarje-Singh]]></article-title>
<source><![CDATA[J Appl Res Technol]]></source>
<year>Oct.</year>
<month> 2</month>
<day>01</day>
<volume>11</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>755-763</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Some remarks on a remote user authentication scheme using smart cards with forward secrecy]]></article-title>
<source><![CDATA[IEEE T Consum Electr]]></source>
<year>2004</year>
<volume>50</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>615­-618</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chien]]></surname>
<given-names><![CDATA[H. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An efficient and practical solution to remote authentication: smart card]]></article-title>
<source><![CDATA[COMPSEC]]></source>
<year>2002</year>
<volume>4</volume>
<numero>21</numero>
<issue>21</issue>
<page-range>372-375</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hsiang]]></surname>
<given-names><![CDATA[H. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Shih]]></surname>
<given-names><![CDATA[W. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards]]></article-title>
<source><![CDATA[Comput Commun]]></source>
<year>2009</year>
<volume>32</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>649-652</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ku]]></surname>
<given-names><![CDATA[W. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards]]></article-title>
<source><![CDATA[IEEE T Consum Electr]]></source>
<year>2004</year>
<volume>50</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>204-207</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramasamy]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Muniyandi]]></surname>
<given-names><![CDATA[A. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[New remote mutual authentication scheme using smart cards]]></article-title>
<source><![CDATA[T data privacy]]></source>
<year>2009</year>
<volume>2</volume>
<page-range>141-152</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lamport]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Password authentication with insecure communication]]></article-title>
<source><![CDATA[Commun ACM]]></source>
<year>1981</year>
<volume>24</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>770-772</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hwang]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[L. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A new remote user authentication scheme using smart cards]]></article-title>
<source><![CDATA[IEEE T Consum Electr]]></source>
<year>2000</year>
<volume>46</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>28-30</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[ElGamal]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A public key cryptosystem and a signature scheme based on discrete logarithms]]></article-title>
<source><![CDATA[IEEE T Inform Theory]]></source>
<year>1985</year>
<volume>31</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>469-472</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[C. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Cheng]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cryptanalysis of a remote user authentication scheme using smart cards]]></article-title>
<source><![CDATA[IEEE T Consum Electr]]></source>
<year>2000</year>
<volume>46</volume>
<page-range>992-993</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shen]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A modified remote user authentication scheme using smart cards]]></article-title>
<source><![CDATA[IEEE T Consum Electr]]></source>
<year>2003</year>
<volume>49</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>414-416</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leung]]></surname>
<given-names><![CDATA[K. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cryptanalysis of a remote user authentication scheme using smart cards]]></article-title>
<source><![CDATA[IEEE T Consum Electr]]></source>
<year>2003</year>
<volume>49</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1243-1245</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Awasthi]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Lal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A remote user authentication scheme using smarts cards with forward secrecy]]></article-title>
<source><![CDATA[IEEE T Consum Electr]]></source>
<year>2003</year>
<volume>49</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1246-1248</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yoon]]></surname>
<given-names><![CDATA[E. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Efficient remote user authentication scheme based on generalized ElGamal signature scheme]]></article-title>
<source><![CDATA[IEEE T Consum Electr]]></source>
<year>2004</year>
<volume>50</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>568-570</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tian]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Improved efficient remote user authentication schemes]]></article-title>
<source><![CDATA[Int J Net Sec]]></source>
<year>2007</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>149-154</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Y. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Smart - card - loss - attack and improvement of Hsiang et al.'s authentication scheme]]></article-title>
<source><![CDATA[J Appl Res Technol]]></source>
<year>Aug.</year>
<month> 2</month>
<day>01</day>
<volume>11</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>597-603</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
