In 2009, Wang et al. proposed an efficient and secure dynamic ID-based remote user authentication scheme based on the one-way secure hash function. This letter demonstrates that Wang et al.'s scheme is still vulnerable to impersonation attacks.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Eun-Jun YOON, Kee-Young YOO, "On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme" in IEICE TRANSACTIONS on Information,
vol. E95-D, no. 6, pp. 1684-1686, June 2012, doi: 10.1587/transinf.E95.D.1684.
Abstract: In 2009, Wang et al. proposed an efficient and secure dynamic ID-based remote user authentication scheme based on the one-way secure hash function. This letter demonstrates that Wang et al.'s scheme is still vulnerable to impersonation attacks.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E95.D.1684/_p
Copy
@ARTICLE{e95-d_6_1684,
author={Eun-Jun YOON, Kee-Young YOO, },
journal={IEICE TRANSACTIONS on Information},
title={On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme},
year={2012},
volume={E95-D},
number={6},
pages={1684-1686},
abstract={In 2009, Wang et al. proposed an efficient and secure dynamic ID-based remote user authentication scheme based on the one-way secure hash function. This letter demonstrates that Wang et al.'s scheme is still vulnerable to impersonation attacks.},
keywords={},
doi={10.1587/transinf.E95.D.1684},
ISSN={1745-1361},
month={June},}
Copy
TY - JOUR
TI - On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
T2 - IEICE TRANSACTIONS on Information
SP - 1684
EP - 1686
AU - Eun-Jun YOON
AU - Kee-Young YOO
PY - 2012
DO - 10.1587/transinf.E95.D.1684
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E95-D
IS - 6
JA - IEICE TRANSACTIONS on Information
Y1 - June 2012
AB - In 2009, Wang et al. proposed an efficient and secure dynamic ID-based remote user authentication scheme based on the one-way secure hash function. This letter demonstrates that Wang et al.'s scheme is still vulnerable to impersonation attacks.
ER -