Improving the novikov and kiselev user authentication scheme
dc.contributor.author | Kim, Minho | |
dc.contributor.author | Koç, Çetin Kaya | |
dc.date.accessioned | 2020-11-21T15:55:43Z | |
dc.date.available | 2020-11-21T15:55:43Z | |
dc.date.issued | 2008 | en_US |
dc.department | İstanbul Ticaret Üniversitesi | en_US |
dc.description.abstract | Novikov and Kiselev [7] proposed an authentication method of a user from a remote autonomous object. Recently, Yang et al. [12] and Awasthi [1] have pointed out that the Novikov-Kiselev scheme is insecure against the man-in-the-middle attack. In this article, we propose an improved version of the Novikov-Kiselev scheme to overcome such vulnerability. | en_US |
dc.identifier.endpage | 245 | en_US |
dc.identifier.issn | 1816353X | |
dc.identifier.issue | 3 | en_US |
dc.identifier.scopus | 2-s2.0-78649673965 | en_US |
dc.identifier.scopusquality | N/A | en_US |
dc.identifier.startpage | 241 | en_US |
dc.identifier.uri | https://hdl.handle.net/11467/4041 | |
dc.identifier.volume | 6 | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | International Journal of Network Security | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Authentication | en_US |
dc.subject | man-in-the-middle attack | en_US |
dc.subject | remote autonomous object | en_US |
dc.title | Improving the novikov and kiselev user authentication scheme | en_US |
dc.type | Article | en_US |