메뉴 건너뛰기




Volumn 53, Issue 5, 2006, Pages 1683-1687

Security enhancement on a new authentication scheme with anonymity for wireless environments

Author keywords

Anonymity; Authentication; Security; Wireless network

Indexed keywords

CONSUMER ELECTRONICS; IDENTIFICATION (CONTROL SYSTEMS); SECURITY SYSTEMS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33750133438     PISSN: 02780046     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIE.2006.881998     Document Type: Article
Times cited : (277)

References (14)
  • 1
    • 0028272762 scopus 로고
    • "Privacy and authentication for wireless local area networks"
    • A. Aziz and W. Diffie, "Privacy and authentication for wireless local area networks," IEEE Pers. Commun., vol. 1, no. 1, pp. 24-31, 1994.
    • (1994) IEEE Pers. Commun. , vol.1 , Issue.1 , pp. 24-31
    • Aziz, A.1    Diffie, W.2
  • 2
    • 0027641891 scopus 로고
    • "Privacy and authentication on a portable communications system"
    • Aug
    • M. J. Beller, L. E Chang, and Y. Yacobi, "Privacy and authentication on a portable communications system," IEEE J. Sel. Areas Commun., vol. 11, no. 6, pp. 821-829, Aug. 1993.
    • (1993) IEEE J. Sel. Areas Commun. , vol.11 , Issue.6 , pp. 821-829
    • Beller, M.J.1    Chang, L.F.2    Yacobi, Y.3
  • 3
    • 2142759434 scopus 로고    scopus 로고
    • "End-to-end security protocol for mobile communications with end-user identification/authentication"
    • Jan
    • C.-C. Chang, K.-L. Chen, and M.-S. Hwang, "End-to-end security protocol for mobile communications with end-user identification/authentication," Wirel. Pers. Commun., vol. 28, no. 2, pp. 95-106, Jan. 2004.
    • (2004) Wirel. Pers. Commun. , vol.28 , Issue.2 , pp. 95-106
    • Chang, C.-C.1    Chen, K.-L.2    Hwang, M.-S.3
  • 4
    • 0036409380 scopus 로고    scopus 로고
    • "An improvement of mobile users authentication in the integration environments"
    • M.-S. Hwang, C.-C. Lee, and W.-P. Yang, "An improvement of mobile users authentication in the integration environments," Int. J. Electron. Commun., vol. 56, no. 5, pp. 293-297, 2002.
    • (2002) Int. J. Electron. Commun. , vol.56 , Issue.5 , pp. 293-297
    • Hwang, M.-S.1    Lee, C.-C.2    Yang, W.-P.3
  • 5
    • 0031144513 scopus 로고    scopus 로고
    • "Authenticated key-exchange in a mobile radio network"
    • M.-S. Hwang and C.-H. Lee, "Authenticated key-exchange in a mobile radio network," Eur. Trans. Telecommun., vol. 8, no. 3, pp. 265-269, 1997.
    • (1997) Eur. Trans. Telecommun. , vol.8 , Issue.3 , pp. 265-269
    • Hwang, M.-S.1    Lee, C.-H.2
  • 6
    • 0029256120 scopus 로고
    • "Conference key distribution protocols for digital mobile communication systems"
    • Feb
    • M.-S. Hwang and W.-P. Yang, "Conference key distribution protocols for digital mobile communication systems," IEEE J. Sel. Areas Commun., vol. 13, no. 2, pp. 416-420, Feb. 1995.
    • (1995) IEEE J. Sel. Areas Commun. , vol.13 , Issue.2 , pp. 416-420
    • Hwang, M.-S.1    Yang, W.-P.2
  • 8
    • 0345306310 scopus 로고    scopus 로고
    • "A new privacy and authentication protocol for end-to-end mobile users"
    • C.-C. Lee, C.-C. Yang, and M.-S. Hwang, "A new privacy and authentication protocol for end-to-end mobile users," Int. J. Commun. Syst., vol. 16, no. 9, pp. 799-808, 2003.
    • (2003) Int. J. Commun. Syst. , vol.16 , Issue.9 , pp. 799-808
    • Lee, C.-C.1    Yang, C.-C.2    Hwang, M.-S.3
  • 9
    • 0032676481 scopus 로고    scopus 로고
    • "Enhanced privacy and authentication for the global system of mobile communications"
    • Jul
    • C.-H. Lee, M.-S. Hwang, and W.-P. Yang, "Enhanced privacy and authentication for the global system of mobile communications," Wirel. Netw., vol. 5, no. 4, pp. 231-243, Jul. 1999.
    • (1999) Wirel. Netw. , vol.5 , Issue.4 , pp. 231-243
    • Lee, C.-H.1    Hwang, M.-S.2    Yang, W.-P.3
  • 10
    • 0032682170 scopus 로고    scopus 로고
    • "Hash-based encryption system"
    • M. Peyravian, A. Roginsky, and N. Zunic, "Hash-based encryption system," Comput. Secur., vol. 18, no. 4, pp. 345-350, 1999.
    • (1999) Comput. Secur. , vol.18 , Issue.4 , pp. 345-350
    • Peyravian, M.1    Roginsky, A.2    Zunic, N.3
  • 11
    • 12444324513 scopus 로고    scopus 로고
    • "Providing secrecy in key management protocols for large wireless sensors networks"
    • R. D. Pietro, L. V. Mancini, and S. Jajodia, "Providing secrecy in key management protocols for large wireless sensors networks," Ad Hoc Netw., vol. 1, no. 4, pp. 455-468, 2003.
    • (2003) Ad Hoc Netw. , vol.1 , Issue.4 , pp. 455-468
    • Pietro, R.D.1    Mancini, L.V.2    Jajodia, S.3
  • 12
    • 84874730829 scopus 로고    scopus 로고
    • "An efficient authentication scheme between MANET and WLAN based on mobile IPv6"
    • C.-W. Chen, M.-C. Chuang, and C.-S. Tsai, "An efficient authentication scheme between MANET and WLAN based on mobile IPv6," Int. J. Netw. Secur., vol. 1, no. 1, pp. 12-19, 2005.
    • (2005) Int. J. Netw. Secur. , vol.1 , Issue.1 , pp. 12-19
    • Chen, C.-W.1    Chuang, M.-C.2    Tsai, C.-S.3
  • 13
    • 33748196456 scopus 로고    scopus 로고
    • "Man-in-the-middle attack on the authentication of the user from the remote autonomous object"
    • C.-Y. Yang, C.-C. Lee, and S.-Y. Hsiao, "Man-in-the-middle attack on the authentication of the user from the remote autonomous object," Int. J. Netw. Secur., vol. 1, no. 1, pp. 22-24, 2005.
    • (2005) Int. J. Netw. Secur. , vol.1 , Issue.1 , pp. 22-24
    • Yang, C.-Y.1    Lee, C.-C.2    Hsiao, S.-Y.3
  • 14
    • 1942487780 scopus 로고    scopus 로고
    • "A new authentication scheme with anonymity for wireless environments"
    • Feb
    • J. Zhu and J. Ma, "A new authentication scheme with anonymity for wireless environments," IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 230-234, Feb. 2004.
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.1 , pp. 230-234
    • Zhu, J.1    Ma, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.