메뉴 건너뛰기




Volumn 27, Issue 5-6, 2008, Pages 216-223

Practical anonymous user authentication scheme with security proof

Author keywords

Anonymity; Authentication; Distributed computer networks; Key distribution; Smart card; User identification

Indexed keywords

CANNING; ELECTRONIC COMMERCE; MOBILE TELECOMMUNICATION SYSTEMS;

EID: 53049100441     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.05.004     Document Type: Article
Times cited : (11)

References (15)
  • 1
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer p. 232-49
    • Bellare M., and Rogaway P. Entity authentication and key distribution. Crypto'93, LNCS 773 (1995), Springer p. 232-49
    • (1995) Crypto'93, LNCS 773
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Springer p. 139-55
    • Bellare M., Pointcheval D., and Rogaway P. Authenticated key exchange secure against dictionary attacks. Eurocrypt 2000, LNCS 1807 (2000), Springer p. 139-55
    • (2000) Eurocrypt 2000, LNCS 1807
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 34548839108 scopus 로고    scopus 로고
    • Improved ID-based security framework for ad hoc network
    • Chien H.-Y., and Lin R.-Y. Improved ID-based security framework for ad hoc network. Ad Hoc Networks 6 1 (2008) 47-60
    • (2008) Ad Hoc Networks , vol.6 , Issue.1 , pp. 47-60
    • Chien, H.-Y.1    Lin, R.-Y.2
  • 5
    • 33744462119 scopus 로고    scopus 로고
    • Chien H-Y, Chen C-H. A remote authentication scheme preserving user anonymity. In: The IEEE first international workshop on information networking and applications-INA'2005. 2005. p. 245-8, ISBN 0-7695-2249-1.
    • Chien H-Y, Chen C-H. A remote authentication scheme preserving user anonymity. In: The IEEE first international workshop on information networking and applications-INA'2005. 2005. p. 245-8, ISBN 0-7695-2249-1.
  • 6
    • 85043791322 scopus 로고
    • An identity-based identification scheme based on discrete logarithms modulo a composite number
    • Springer-Verlag p. 481-6
    • Girault M. An identity-based identification scheme based on discrete logarithms modulo a composite number. EUROCRYPT'90 (1991), Springer-Verlag p. 481-6
    • (1991) EUROCRYPT'90
    • Girault, M.1
  • 7
    • 3342939443 scopus 로고    scopus 로고
    • An efficient user identification scheme based on ID-based cryptosystem
    • Hwang M.S., Lo J.W., and Lin S.C. An efficient user identification scheme based on ID-based cryptosystem. Computer Standards and Interfaces 26 6 (2004) 565-569
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.6 , pp. 565-569
    • Hwang, M.S.1    Lo, J.W.2    Lin, S.C.3
  • 8
    • 0034225062 scopus 로고    scopus 로고
    • User identification and key distribution maintaining anonymity for distributed computer network
    • Lee W.B., and Chang C.C. User identification and key distribution maintaining anonymity for distributed computer network. Computer System Science 15 4 (2000) 113-116
    • (2000) Computer System Science , vol.15 , Issue.4 , pp. 113-116
    • Lee, W.B.1    Chang, C.C.2
  • 9
    • 3042551124 scopus 로고    scopus 로고
    • Tseng YM, Jan JK. ID-based cryptographic schemes using a non-interactive public-key distribution system. In: Proceedings of IEEE ACSAC98, Phoenix, Arizona. 1998. p. 237-43.
    • Tseng YM, Jan JK. ID-based cryptographic schemes using a non-interactive public-key distribution system. In: Proceedings of IEEE ACSAC98, Phoenix, Arizona. 1998. p. 237-43.
  • 10
    • 10644225185 scopus 로고    scopus 로고
    • New efficient user identification and key distribution scheme providing enhanced security
    • Yang Y., Wang S., Bao F., Wang J., and Deng R.H. New efficient user identification and key distribution scheme providing enhanced security. Computers and Security 23 8 (2004) 697-704
    • (2004) Computers and Security , vol.23 , Issue.8 , pp. 697-704
    • Yang, Y.1    Wang, S.2    Bao, F.3    Wang, J.4    Deng, R.H.5
  • 12
    • 34248678132 scopus 로고    scopus 로고
    • A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    • Lu R., Cao Z., Wang L., and Sun C. A secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Computer Standards and Interfaces 29 (2007) 521-527
    • (2007) Computer Standards and Interfaces , vol.29 , pp. 521-527
    • Lu, R.1    Cao, Z.2    Wang, L.3    Sun, C.4
  • 13
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding Y., and Horster P. Undetectable on-line password guessing attacks. ACM Operating Systems Review 29 (Apr 1995) 77-86
    • (1995) ACM Operating Systems Review , vol.29 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 14
    • 0032218224 scopus 로고    scopus 로고
    • Halevi S, Krawczyk H. Public-key cryptography and password protocols. In: Proceedings of the 5th ACM conference on computer and communications security, San Francisco, USA. 1998. p. 122-31.
    • Halevi S, Krawczyk H. Public-key cryptography and password protocols. In: Proceedings of the 5th ACM conference on computer and communications security, San Francisco, USA. 1998. p. 122-31.
  • 15
    • 12844274508 scopus 로고    scopus 로고
    • Note on robust and simple authentication protocol
    • Chien H.Y., Wang R.C., and Yang C.C. Note on robust and simple authentication protocol. The Computer Journal 48 1 (2005) 27-29
    • (2005) The Computer Journal , vol.48 , Issue.1 , pp. 27-29
    • Chien, H.Y.1    Wang, R.C.2    Yang, C.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.