Secure Modification to Hsiang-SHIH’S Schema: A Case Study
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 6
Abstract
The proposed schemes of Hsiang and Shih for the remote User authentication scheme using smart card they expropriate their schemes guarded against parallel session attack, and password guessing attacks, I, in this paper suggested that Hsiang and Shih’s schemes are still in jeopardy to off-line password guessing attacks and imperceptible to on-line password guessing attacks. The scenario will be same in which the user loss smart card as in the schemes of Hsian and shih’s. This proposal is a productive reconstruction and beat the security flaws in the Hsiang and Shih’s remote user authentication schemes using smart cards.
Authors and Affiliations
Mohd Yousuf
Adsorption Studies of Hexavalent Chromium Removal on Activated Carbon Derived From Helianthus Annuus (Sunflower Cob)
The present study deals with removal of hexavalent chromium from aqueous solution using low cost activated carbon prepared from helianthus annuus cob. In adsorption solute present in dilute concentration in liquid...
MATHEMATICS ANXIETY AND THE ACADEMIC PERFORMANCE OF THE FRESHMEN COLLEGE STUDENTS OF THE NAVAL STATE UNIVERSITY
The main objective of this study was to determine the relationship between the level of Mathematics anxiety and the academic performance of the students at the Naval State University. The data were gathered th...
INTRODUCTION OF GENERALIZED LAPLACE-FRACTIONAL MELLIN TRANSFORM
In present era, Fractional Integral Transform plays an important role in various fields of mathematics and Technology. Mellin transform has an many application in navigations, correlaters, in area of statistic...
A Novel Gyro-less Tracking Method for Star Tracker
In this paper a new tracking method is presented, which is one of the most important and useful algorithms in the stat tracker normal mode. the developed algorithm is gyro less algorithm without need to angular sp...
A REVIEW PAPER ON HREF BASED ROUTE SELECTION IN AODV FOR MANETS
Mobile ad hoc networks are self-organizing networks composed of independent mobile nodes. All mobile nodes act as router as well as hosts. The most important characteristic of MANETs is their dynamically changing...