Secure Modification to Hsiang-SHIH’S Schema: A Case Study

Abstract

 The proposed schemes of Hsiang and Shih for the remote User authentication scheme using smart card they expropriate their schemes guarded against parallel session attack, and password guessing attacks, I, in this paper suggested that Hsiang and Shih’s schemes are still in jeopardy to off-line password guessing attacks and imperceptible to on-line password guessing attacks. The scenario will be same in which the user loss smart card as in the schemes of Hsian and shih’s. This proposal is a productive reconstruction and beat the security flaws in the Hsiang and Shih’s remote user authentication schemes using smart cards.

Authors and Affiliations

Mohd Yousuf

Keywords

Related Articles

 THEORETICAL DEVELOPMENT OF MECHANISM FOR SAVING FUEL IN FOUR STROKE ENGINE WHILE GOING DOWNHILL WITHOUT COASTING

 As most of our needs of energy nowadays are satisfied by nonrenewable fuels. So mankind is now in the fear of those fuels getting exhausted in near future. We are in search of new fuels and also of the methods of...

Transient Stability Analysis of Power System Using Matlab

This paper presents transient stability assessment of multi Transient stability of a power system is based on the generator relative rotor angles obtained from time domain simulations outputs. A self sufficient model o...

DESIGN OF COLD FORMED STEEL COMPRESSION MEMBERS USING ARTIFICIAL NEURAL NETWORK

The main aim of this study is to demonstrate the usefulness of Artificial Neural Network (ANN) in the creation of knowledge base available in the form of design standards. As an example, in this study, ANN is used for d...

FLEXIBILITY OF EXISTING SUPD DESIGNS FOR IM PACT LOAD TESTING OF MOTORBIKES

This research work describes nature of under ride, the design and analysis of new guard or protection device for sides of heavy and medium goods vehicle .The newly designed guard is designed and tested according to th...

 A GENETIC ALGORITHM FOR PERFORMANCE OPTIMIZATION OF A STOCHASTIC FLOW NETWORK WITH COST ATTRIBUTE IN TERMS OF MINIMAL CUTS

 The paper presents a genetic algorithm to generate minimal cuts for a stochastic flow network with cost attribute to evaluate the performance index a stochastic- flow network in which each arc has several capaciti...

Download PDF file
  • EP ID EP122389
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Mohd Yousuf (30).  Secure Modification to Hsiang-SHIH’S Schema: A Case Study. International Journal of Engineering Sciences & Research Technology, 3(6), 455-459. https://europub.co.uk/articles/-A-122389