Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network
スポンサーリンク
概要
- 論文の詳細を見る
In 1998, Jan and Tseng proposed two integrated schemes of user authentication and access control which can be used to implement a protection system in distributed computer systems. This paper will analyze the security of both schemes and show that an intruder can easily forge a login, be accepted and logged in as a legal user, and access system resources. We will then propose a modified scheme to withstand our proposed attacks.
- 社団法人電子情報通信学会の論文
- 2002-02-01
著者
関連論文
- Robust Digital Signature Scheme with Subliminal Channels(Special Section on Cryptography and Information Security)
- Analysis on Traceability on Stadler et al.'s Fair Blind Signature
- Analysis on Traceability on Stadler et al.'s Fair Blind Signature(Information Security)
- The Security of the Improvement on the Generalization of Threshold Signature and Authenticated Encryption
- Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network
- Web Metering Scheme Based on the Bilinear Pairings(Application Information Security)
- Comment on Traceability Analysis on Chaum Blind Signature Scheme(Information Security)
- Improvement of One-Time Password Authentication Scheme Using Smart Cards(Fundamental Theories for Communications)