메뉴 건너뛰기




Volumn 5, Issue 5, 2007, Pages 590-601

Anonymous authentication scheme for wireless communications

Author keywords

Anonymity; Authentication; Mobility; Wireless communications

Indexed keywords

AUTHENTICATION; MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY;

EID: 34547328595     PISSN: 1470949X     EISSN: None     Source Type: Journal    
DOI: 10.1504/IJMC.2007.013941     Document Type: Article
Times cited : (11)

References (26)
  • 1
    • 13144295047 scopus 로고    scopus 로고
    • An efficient wireless transmission method for m-commerce
    • Abuelyaman, E. and Wen, H.J. (2004) 'An efficient wireless transmission method for m-commerce', Int. J. Mobile Communications, Vol. 2, pp.405-417.
    • (2004) Int. J. Mobile Communications , vol.2 , pp. 405-417
    • Abuelyaman, E.1    Wen, H.J.2
  • 2
    • 0242335649 scopus 로고    scopus 로고
    • Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications
    • Barbancho, A.M. and Peinado, A. (2003) 'Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications', Computer Networks, Vol. 43, pp.777-785.
    • (2003) Computer Networks , vol.43 , pp. 777-785
    • Barbancho, A.M.1    Peinado, A.2
  • 4
    • 10044260029 scopus 로고    scopus 로고
    • An efficient password authenticated key exchange protocol for imbalanced wireless networks
    • Chang, Y.F., Chang, C.C. and Yang, J.H. (2004) 'An efficient password authenticated key exchange protocol for imbalanced wireless networks', Computer Standards and Interfaces, Vol. 27, pp.313-322.
    • (2004) Computer Standards and Interfaces , vol.27 , pp. 313-322
    • Chang, Y.F.1    Chang, C.C.2    Yang, J.H.3
  • 5
    • 2142759434 scopus 로고    scopus 로고
    • End-to-end security protocols for mobile communications with end-user identification/ authentication
    • Chang, C.C., Chen, K.L. and Hwang, M.S. (2004) 'End-to-end security protocols for mobile communications with end-user identification/ authentication', Wireless Personal Communications, Vol. 28, pp.95-106.
    • (2004) Wireless Personal Communications , vol.28 , pp. 95-106
    • Chang, C.C.1    Chen, K.L.2    Hwang, M.S.3
  • 6
    • 17644390205 scopus 로고    scopus 로고
    • Efficient authentication protocols of GSM
    • Chang, C.C., Lee, J.S. and Chang, Y.F. (2005) 'Efficient authentication protocols of GSM', Computer Communications, Vol. 28, pp.921-928.
    • (2005) Computer Communications , vol.28 , pp. 921-928
    • Chang, C.C.1    Lee, J.S.2    Chang, Y.F.3
  • 7
    • 33645970770 scopus 로고    scopus 로고
    • A secure and efficient authentication scheme for mobile users
    • Chang, Y.F., Lee, J.S. and Chang, C.C. (2006) 'A secure and efficient authentication scheme for mobile users', Int. J. Mobile Communications, Vol. 4, pp.581-594.
    • (2006) Int. J. Mobile Communications , vol.4 , pp. 581-594
    • Chang, Y.F.1    Lee, J.S.2    Chang, C.C.3
  • 9
    • 84958780603 scopus 로고    scopus 로고
    • Horn, G. and Preneel, B. (1998) 'Authentication and payment in future mobile systems'. Paper presented in the Proceedings of the 5th European Symposium on Research in Computer Security, pp.277-293.
    • Horn, G. and Preneel, B. (1998) 'Authentication and payment in future mobile systems'. Paper presented in the Proceedings of the 5th European Symposium on Research in Computer Security, pp.277-293.
  • 10
    • 0036505541 scopus 로고    scopus 로고
    • Authentication protocols for mobile network environment value-added services
    • Horn, G., Martin, K.M. and Mitchell, C.J. (2002) 'Authentication protocols for mobile network environment value-added services', IEEE Transactions on Vehicular Technology, Vol. 51, pp.383-392.
    • (2002) IEEE Transactions on Vehicular Technology , vol.51 , pp. 383-392
    • Horn, G.1    Martin, K.M.2    Mitchell, C.J.3
  • 13
    • 2942554940 scopus 로고    scopus 로고
    • Mobile communications: Global trends in the 21st century
    • Kumar, S. (2004) 'Mobile communications: global trends in the 21st century'. Int. J. Mobile Communications, Vol. 2, pp.67-86.
    • (2004) Int. J. Mobile Communications , vol.2 , pp. 67-86
    • Kumar, S.1
  • 14
    • 20144378400 scopus 로고    scopus 로고
    • Consumer value creation in mobile banking services
    • Laukkanen, T. and Lauroene, J. (2005) 'Consumer value creation in mobile banking services', Int. J. Mobile Communications, Vol. 3, pp.325-338.
    • (2005) Int. J. Mobile Communications , vol.3 , pp. 325-338
    • Laukkanen, T.1    Lauroene, J.2
  • 15
    • 84961557251 scopus 로고    scopus 로고
    • A framework for delivering secure mobile location information
    • Olla, P. and Patel, N.V. (2003) 'A framework for delivering secure mobile location information', Int. J. Mobile Communications, Vol. 1, pp.289-300.
    • (2003) Int. J. Mobile Communications , vol.1 , pp. 289-300
    • Olla, P.1    Patel, N.V.2
  • 16
    • 0346895307 scopus 로고    scopus 로고
    • Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    • Park, C.S. (2004) 'Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems', Computer Networks. Vol. 44, pp.267 273.
    • (2004) Computer Networks , vol.44 , pp. 267-273
    • Park, C.S.1
  • 18
    • 4544286919 scopus 로고    scopus 로고
    • Privacy and authentication protocol providing anonymous channels in GSM
    • Peinado, A. (2004) 'Privacy and authentication protocol providing anonymous channels in GSM', Computer Communications, Vol. 27, pp. 1709-1715.
    • (2004) Computer Communications , vol.27 , pp. 1709-1715
    • Peinado, A.1
  • 19
    • 3042737904 scopus 로고    scopus 로고
    • Wireless security's future
    • Potter, B. (2003) 'Wireless security's future', IEEE Security and Privacy, Vol. 1, pp.68-72.
    • (2003) IEEE Security and Privacy , vol.1 , pp. 68-72
    • Potter, B.1
  • 20
    • 84944291851 scopus 로고
    • Overview of the GSM system and protocol architecture
    • Rahnema, M. (1993) 'Overview of the GSM system and protocol architecture', IEEE Communications Magazine, Vol. 31, pp.92-100.
    • (1993) IEEE Communications Magazine , vol.31 , pp. 92-100
    • Rahnema, M.1
  • 21
    • 0029232793 scopus 로고    scopus 로고
    • Samfat, D. and Molva, R. (1994) 'A method providing identity privacy to mobile users during authentication', Paper presented in the Proceedings of the Workshop on Mobile Computing Systems and Applications, pp. 196-199.
    • Samfat, D. and Molva, R. (1994) 'A method providing identity privacy to mobile users during authentication', Paper presented in the Proceedings of the Workshop on Mobile Computing Systems and Applications, pp. 196-199.
  • 25
    • 2942690217 scopus 로고    scopus 로고
    • Tseng, Y.M., Yang, C.C. and Su, J.H. (2004) 'An efficient authentication protocol for integrating WLAN and cellular networks', Paper presented in the Proceedings of the 6th International Conference on Advanced Communication Technology, pp.416-420.
    • Tseng, Y.M., Yang, C.C. and Su, J.H. (2004) 'An efficient authentication protocol for integrating WLAN and cellular networks', Paper presented in the Proceedings of the 6th International Conference on Advanced Communication Technology, pp.416-420.
  • 26
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu, J. and Ma, J. (2004) 'A new authentication scheme with anonymity for wireless environments', IEEE Transactions on Consumer Electronics, Vol. 50, pp.231-235.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , pp. 231-235
    • Zhu, J.1    Ma, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.