Secure Modification to Hsiang-SHIH’S Schema: A Case Study

Abstract

 The proposed schemes of Hsiang and Shih for the remote User authentication scheme using smart card they expropriate their schemes guarded against parallel session attack, and password guessing attacks, I, in this paper suggested that Hsiang and Shih’s schemes are still in jeopardy to off-line password guessing attacks and imperceptible to on-line password guessing attacks. The scenario will be same in which the user loss smart card as in the schemes of Hsian and shih’s. This proposal is a productive reconstruction and beat the security flaws in the Hsiang and Shih’s remote user authentication schemes using smart cards.

Authors and Affiliations

Mohd Yousuf

Keywords

Related Articles

 Adsorption Studies of Hexavalent Chromium Removal on Activated Carbon Derived From Helianthus Annuus (Sunflower Cob)

 The present study deals with removal of hexavalent chromium from aqueous solution using low cost activated carbon prepared from helianthus annuus cob. In adsorption solute present in dilute concentration in liquid...

 MATHEMATICS ANXIETY AND THE ACADEMIC PERFORMANCE OF THE FRESHMEN COLLEGE STUDENTS OF THE NAVAL STATE UNIVERSITY

 The main objective of this study was to determine the relationship between the level of Mathematics anxiety and the academic performance of the students at the Naval State University. The data were gathered th...

 INTRODUCTION OF GENERALIZED LAPLACE-FRACTIONAL MELLIN TRANSFORM

 In present era, Fractional Integral Transform plays an important role in various fields of mathematics and Technology. Mellin transform has an many application in navigations, correlaters, in area of statistic...

 A Novel Gyro-less Tracking Method for Star Tracker

 In this paper a new tracking method is presented, which is one of the most important and useful algorithms in the stat tracker normal mode. the developed algorithm is gyro less algorithm without need to angular sp...

 A REVIEW PAPER ON HREF BASED ROUTE SELECTION IN AODV FOR MANETS

 Mobile ad hoc networks are self-organizing networks composed of independent mobile nodes. All mobile nodes act as router as well as hosts. The most important characteristic of MANETs is their dynamically changing...

Download PDF file
  • EP ID EP122389
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Mohd Yousuf (30).  Secure Modification to Hsiang-SHIH’S Schema: A Case Study. International Journal of Engineering Sciences & Research Technology, 3(6), 455-459. https://europub.co.uk/articles/-A-122389