<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tzung-Her Chen</style></author><author><style face="normal" font="default" size="100%">Du-Shiau Tsai</style></author><author><style face="normal" font="default" size="100%">Gwoboa Horng</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Secure User-Friendly Remote Authentication Schemes</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Mutual Authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">Remote Authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">Smart Card</style></keyword><keyword><style  face="normal" font="default" size="100%">User Impersonation.</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">18</style></volume><pages><style face="normal" font="default" size="100%">111-121</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Recently, Hwang and Li proposed a remote user authentication scheme that does not require a password table to verify the legitimacy of a legal user.  This method uses smart cards. To benefit from this advantage, other research works have explored adding such features as reducing the computational cost, adopting user-friendly passwords, making it easier to change user passwords, etc. However, as cryptanalysis has evolved, a series of modifications that improve the known security flaws have been made subsequently. This article deals with a security problem found in a latest modification and improves it in order to construct a more secure function. The article also highlights a feature, mutual authentication between a server and users, found in many authentication protocols but seldom found in the considered series of modifications.</style></abstract></record></records></xml>