Essay On Smart Card Oriented Remote User Authentication Protocol

premiumpapers.netLooking for research paper writing help? Are you in High School, College, Masters, Bachelors or Ph.D All you need is to ask for research, term paper, thesis help written by a specialist in your academic field. When you buy a customized essay from We offer you an original, 0%- plagiarized and unique research paper written by a dedicated writer who is PhD or Masters qualified. is an experienced service with over 8 years experience having delivered over 79,500 essays over the years.

Get Your Essay Done by a Specialist

NB: Click Our Prices for more. Our starting prices are as shown below!
We have over 10 years in the essay, term paper, research writing over the continents: US, UK, CAD, UAE, Russia, Netherlands, South Africa, Europe, Asia etc.
We have a pool of 1112 seasoned & qualified veteran academic research writers in over 77+ fields.
At revision is free if you are not satisfied, Our organization has a money back policy to ensure all our clients are satisfied and keep coming back
Applying for an order is easy on our site, visit our order page and place all your order information if you have attachments upload them and we will write from scratch.
For every order placed at, you will receive a plagiarism, grammar check report is affordable, but our quality it premium since we have a huge pool of clients


Smart Card Oriented Remote User Authentication Protocol

Information technology has progressed in a rapid manner, in this light there have been lots of distributed applications that have come up as a result of this growth. Firstly, there has been the e-commerce, banks, airline reservation systems that have both been developed and deployed into the internet. Therefore, it is natural that with this sensitive system all over the internet, security concerns will arise. To ensure that security is improved, there is a need for an improved robust as well as efficient authenticated key agreement protocol that is designed to support the different applications. The researchers propose a protocol that is designed to improve as well as enhance the security of Yeh et al. scheme. To do this efficiently, they first go about reviewing and analyzing Yeh et al. scheme and then they go ahead to propose their scheme.

The researchers found out that indeed in Yeh et al. proposed two authenticated key agreement protocols, the second protocol had in the issue regarding user anonymity. It is extremely important to realize that indeed user anonymity is a big issue in the Internet. This is because identity theft is propagated when user anonymity does not exist. Further, it is critical also to note that important data that is not intended for the public can be easily retrieved if user anonymity is not achieved in the right manner.

Therefore, the researchers propose a mutual authentication and key agreement. This system is important as it can secure against the attacks above that are susceptible to Yeh et al.’s scheme. However, it is important to note that indeed the proposed scheme by the researchers does not achieve the traceability property that can help hide the user’s identity from malicious attackers.


Chang, C. et al., (2011). A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol. 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing , 252-255.