Analysis to Wen and Li's Scheme

In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonym...

Full description

Saved in:
Bibliographic Details
Published in2012 Sixth International Conference on Genetic and Evolutionary Computing pp. 82 - 86
Main Authors Chun-Hong Lin, Chao-Wen Chan
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.08.2012
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In 2012, Wen and Li pointed out the weaknesses of Wang et al.'s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the proposed scheme still has a weak point, anonymity, a scheme claimed dynamic ID-based must propose to be had. in this paper, we improve its anonymity.
ISBN:9781467321389
1467321389
DOI:10.1109/ICGEC.2012.61