Analysis to Wen and Li's Scheme
In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonym...
Saved in:
Published in | 2012 Sixth International Conference on Genetic and Evolutionary Computing pp. 82 - 86 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2012
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonymity, a scheme claimed dynamic ID-based must propose to be had. in this paper, we improve its anonymity. |
---|---|
ISBN: | 9781467321389 1467321389 |
DOI: | 10.1109/ICGEC.2012.61 |