메뉴 건너뛰기




Volumn 44, Issue 2, 2004, Pages 267-273

Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems

Author keywords

Anonymity; Authentication; Error correcting codes; Wireless

Indexed keywords

ALGEBRA; CODES (SYMBOLS); COMPUTER HARDWARE; CRYPTOGRAPHY; DATABASE SYSTEMS; ERROR CORRECTION; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; SERVERS;

EID: 0346895307     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2003.09.001     Document Type: Article
Times cited : (27)

References (23)
  • 2
    • 0030287972 scopus 로고    scopus 로고
    • Security of private-key encryption based on array codes
    • Al Jabri A. Security of private-key encryption based on array codes. Electronics Letters. 32(24):1996;2226-2227.
    • (1996) Electronics Letters , vol.32 , Issue.24 , pp. 2226-2227
    • Al Jabri, A.1
  • 5
    • 84958666890 scopus 로고    scopus 로고
    • Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
    • Berlin: Springer
    • Berson T.A. Failure of the McEliece public-key cryptosystem under message-resend and related-message attack. Advances in Cryptology - CRYPTO'97. 1997;213-220 Springer, Berlin.
    • (1997) Advances in Cryptology - CRYPTO'97 , pp. 213-220
    • Berson, T.A.1
  • 6
    • 0012845534 scopus 로고    scopus 로고
    • Public key protocols for wireless communications
    • C. Boyd, D.-G. Park, Public key protocols for wireless communications, in: Proceedings of the ICISC, 1998, pp. 47-57.
    • (1998) Proceedings of the ICISC , pp. 47-57
    • Boyd, C.1    Park, D.-G.2
  • 10
    • 0025508369 scopus 로고
    • Network Security via private-key certificates
    • Davis D., Swick R. Network Security via private-key certificates. Operating Systems Review. 24:1990;64-67.
    • (1990) Operating Systems Review , vol.24 , pp. 64-67
    • Davis, D.1    Swick, R.2
  • 12
    • 0345977489 scopus 로고    scopus 로고
    • Gemplus. Available from < www.gemplus.com>.
  • 13
    • 84937740421 scopus 로고
    • Shift register synthesis and BCH decoding
    • Massey J.L. Shift register synthesis and BCH decoding. IEEE Transactions on Information Theory. 15(1):1969;122-127.
    • (1969) IEEE Transactions on Information Theory , vol.15 , Issue.1 , pp. 122-127
    • Massey, J.L.1
  • 14
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • Jet Propulsion Lab., CA, January and February
    • R.J. McEliece, A public-key cryptosystem based on algebraic coding theory, DSN Progress Report, Jet Propulsion Lab., CA, January and February 1978, pp. 42-44.
    • (1978) DSN Progress Report , pp. 42-44
    • McEliece, R.J.1
  • 15
    • 0028397595 scopus 로고
    • An authentication protocol for mobile users
    • Molva R., Samfat D., Tsudik G. An authentication protocol for mobile users. IEEE Networks. 8(2):1994;26-34.
    • (1994) IEEE Networks , vol.8 , Issue.2 , pp. 26-34
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 16
    • 0024752648 scopus 로고
    • Improving code rate of McEliece public-key cryptosystem
    • Park C.-S. Improving code rate of McEliece public-key cryptosystem. Electronics Letters. 25(21):1989;1466-1467.
    • (1989) Electronics Letters , vol.25 , Issue.21 , pp. 1466-1467
    • Park, C.-S.1
  • 17
    • 0031234695 scopus 로고    scopus 로고
    • On certificate-based security protocols for the wireless mobile communication systems
    • Park C.-S. On certificate-based security protocols for the wireless mobile communication systems. IEEE Networks. 11(9):1997;50-55.
    • (1997) IEEE Networks , vol.11 , Issue.9 , pp. 50-55
    • Park, C.-S.1
  • 18
  • 19
    • 0346608757 scopus 로고
    • A method providing identity privacy to mobile users during authentication
    • Santa Cruz, CA, December 8-9
    • D. Samfat, R. Molva, A method providing identity privacy to mobile users during authentication, in: IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, December 8-9, 1994.
    • (1994) IEEE Workshop on Mobile Computing Systems and Applications
    • Samfat, D.1    Molva, R.2
  • 20
    • 84956862729 scopus 로고
    • The Rao-Nam scheme is insecure against a chosen-plaintext attack
    • Berlin: Springer
    • Struik R., Tilburg J. The Rao-Nam scheme is insecure against a chosen-plaintext attack. Advances in Cryptology - CRYPTO'87. 1988;445-457 Springer, Berlin.
    • (1988) Advances in Cryptology - CRYPTO'87 , pp. 445-457
    • Struik, R.1    Tilburg, J.2
  • 22
    • 0347238445 scopus 로고    scopus 로고
    • On private-key cryptosystem based on product codes, information security and privacy
    • Proceedings of the Third Australasian Conference, ACISP'98 Brisbane, Australia, Berlin: Springer
    • Sun H.M., Shieh S.P. On private-key cryptosystem based on product codes, information security and privacy. Proceedings of the Third Australasian Conference, ACISP'98, Brisbane, Australia, Lecture Notes in Computer Science, vol. 1438. 1998;64-79 Springer, Berlin.
    • (1998) Lecture Notes in Computer Science , vol.1438 , pp. 64-79
    • Sun, H.M.1    Shieh, S.P.2
  • 23


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.