메뉴 건너뛰기




Volumn , Issue , 2007, Pages 461-464

New efficient user authentication scheme with user anonymity facilitating e-commerce applications

Author keywords

Anonymity; Authentication; Distributed computer networks; Key distribution; User identification

Indexed keywords

ANONYMITY; AUTHENTICATION; COMPUTATIONAL PERFORMANCE; DISTRIBUTED COMPUTER NETWORKS; E-COMMERCE; E-COMMERCE APPLICATIONS; E-SERVICES; ENTERPRISE COMPUTING; INTERNATIONAL CONFERENCES; KEY DISTRIBUTION; KEY DISTRIBUTION SCHEME; SECURITY FLAWS; USER ANONYMITY; USER AUTHENTICATION SCHEME; USER IDENTIFICATION;

EID: 49949104000     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CEC-EEE.2007.73     Document Type: Conference Paper
Times cited : (3)

References (11)
  • 2
    • 85043791322 scopus 로고
    • An identity-based identification scheme based on discrete logarithms modulo a composite number
    • Girault, M., "An identity-based identification scheme based on discrete logarithms modulo a composite number," EUROCRYPT'90, 1991, pp. 481-486.
    • (1991) EUROCRYPT'90 , pp. 481-486
    • Girault, M.1
  • 3
    • 3342939443 scopus 로고    scopus 로고
    • An efficient user identification scheme based on ID-based cryptosystem
    • Hwang, M.S., Lo J.W. and Lin S.C., "An efficient user identification scheme based on ID-based cryptosystem," Computer Standards and Interfaces 26(6), 2004, pp. 565-569.
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.6 , pp. 565-569
    • Hwang, M.S.1    Lo, J.W.2    Lin, S.C.3
  • 4
    • 0034225062 scopus 로고    scopus 로고
    • User identification and key distribution maintaining anonymity for distributed computer network
    • Lee, W.B. and Chang C.C., "User identification and key distribution maintaining anonymity for distributed computer network," Computer System science 15(4), 2000, pp. 113-116.
    • (2000) Computer System science , vol.15 , Issue.4 , pp. 113-116
    • Lee, W.B.1    Chang, C.C.2
  • 5
    • 49949091569 scopus 로고
    • A method for obtaining digital signature and public -key cryptosystem
    • Rivest, R., Shamir A. and Adleman L., "A method for obtaining digital signature and public -key cryptosystem," Communication ACM 21(8), 1974, pp.442-5.
    • (1974) Communication ACM , vol.21 , Issue.8 , pp. 442-445
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 8
    • 0036302680 scopus 로고    scopus 로고
    • An Efficient and Practical Solution to Remote Authentication: Smart Card
    • Chien, H. Y., Jan, J. K. and Tseng, Y. M. "An Efficient and Practical Solution to Remote Authentication: Smart Card", Computers & Security 21(4), pp. 372-375, (2002).
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 9
    • 10644225185 scopus 로고    scopus 로고
    • New efficient User identification and key distribution scheme providing enhanced security
    • Yang, Y., Wang S., Bao F., Wang J. and Deng R.H., "New efficient User identification and key distribution scheme providing enhanced security," Computers and Security 23(8), 2004, pp. 697-704.
    • (2004) Computers and Security , vol.23 , Issue.8 , pp. 697-704
    • Yang, Y.1    Wang, S.2    Bao, F.3    Wang, J.4    Deng, R.H.5
  • 10
    • 33646746196 scopus 로고    scopus 로고
    • Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity
    • Yoon, E.J. and Yoo K.Y., "Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity," ICICS 2005, pp. 315-322.
    • (2005) ICICS , pp. 315-322
    • Yoon, E.J.1    Yoo, K.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.