AbstractRecently, Wang, Liu, Xiao and Dan proposed an efficient and secure dynamic ID-based remote user authentication scheme and claimed that their scheme provides strong security. We demonstrate that Wang et al.’s scheme is vulnerable to insider, masquerade and server spoofing attacks
Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.