메뉴 건너뛰기




Volumn 179, Issue 4, 2009, Pages 422-429

A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks

Author keywords

Anonymity; Identification; Key confirmation; Key distribution; Mutual authentication

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMPUTER NETWORKS; COMPUTERS; INTERNET;

EID: 56949092341     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2008.10.006     Document Type: Article
Times cited : (25)

References (15)
  • 1
    • 34447321042 scopus 로고    scopus 로고
    • EC2C-PAKA: an efficient client-to-client password-authenticated key agreement
    • Byun J.W., Lee D.H., and Lim J.I. EC2C-PAKA: an efficient client-to-client password-authenticated key agreement. Information Sciences 177 19 (2007) 3995-4013
    • (2007) Information Sciences , vol.177 , Issue.19 , pp. 3995-4013
    • Byun, J.W.1    Lee, D.H.2    Lim, J.I.3
  • 2
    • 33846811464 scopus 로고    scopus 로고
    • Identity-based conference key distribution protocol with user anonymity
    • Cai Y., and Wang Y. Identity-based conference key distribution protocol with user anonymity. Chinese Journal of Electronics 16 1 (2008) 179-181
    • (2008) Chinese Journal of Electronics , vol.16 , Issue.1 , pp. 179-181
    • Cai, Y.1    Wang, Y.2
  • 3
    • 41649104135 scopus 로고    scopus 로고
    • Privacy-enhancing authenticated key agreement protocols based on elliptic curve cryptosystem
    • Cao T.J., and Lei H. Privacy-enhancing authenticated key agreement protocols based on elliptic curve cryptosystem. Acta Electronica Sinica 36 2 (2008) 397-401
    • (2008) Acta Electronica Sinica , vol.36 , Issue.2 , pp. 397-401
    • Cao, T.J.1    Lei, H.2
  • 6
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31 4 (1985) 469-472
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 7
    • 56949085611 scopus 로고    scopus 로고
    • A.O. Freier, P. Karlton, P.C. Kocher, Secure Socket Layer 3.0, Internet Draft, 1996.
    • A.O. Freier, P. Karlton, P.C. Kocher, Secure Socket Layer 3.0, Internet Draft, 1996.
  • 8
    • 56949106276 scopus 로고    scopus 로고
    • J. Kohl, C. Neuman, The Kerberos authentication service (v5), Internet RFC 1510, 1993.
    • J. Kohl, C. Neuman, The Kerberos authentication service (v5), Internet RFC 1510, 1993.
  • 9
    • 0034225062 scopus 로고    scopus 로고
    • User identification and key distribution maintaining anonymity for distributed computer network
    • Lee W.B., and Chang C.C. User identification and key distribution maintaining anonymity for distributed computer network. Computer Systems Science and Engineering 15 4 (1999) 113-116
    • (1999) Computer Systems Science and Engineering , vol.15 , Issue.4 , pp. 113-116
    • Lee, W.B.1    Chang, C.C.2
  • 10
    • 33748125161 scopus 로고    scopus 로고
    • A secure identification and key agreement protocol with user anonymity (SIKA)
    • Mangipudi K., and Katti R. A secure identification and key agreement protocol with user anonymity (SIKA). Computers and Security 25 6 (2006) 420-425
    • (2006) Computers and Security , vol.25 , Issue.6 , pp. 420-425
    • Mangipudi, K.1    Katti, R.2
  • 12
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public-key cryptosystem
    • Rivest R., Shamir A., and Adleman L. A method for obtaining digital signature and public-key cryptosystem. Communications of the ACM 21 2 (1978) 120-126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 13
    • 1542335490 scopus 로고    scopus 로고
    • Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
    • Wu T.S., and Hsu C.L. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Computers and Security 23 2 (2004) 120-125
    • (2004) Computers and Security , vol.23 , Issue.2 , pp. 120-125
    • Wu, T.S.1    Hsu, C.L.2
  • 14
    • 43849103766 scopus 로고    scopus 로고
    • Recursive protocol for group-oriented authentication with key distribution
    • Wu T.C., Huang T.T., Hsu C.L., and Tsai K.Y. Recursive protocol for group-oriented authentication with key distribution. Journal of Systems and Software 81 7 (2008) 1227-1239
    • (2008) Journal of Systems and Software , vol.81 , Issue.7 , pp. 1227-1239
    • Wu, T.C.1    Huang, T.T.2    Hsu, C.L.3    Tsai, K.Y.4
  • 15
    • 10644225185 scopus 로고    scopus 로고
    • New efficient user identification and key distribution scheme providing enhanced security
    • Yang Y., Wang S., Bao F., Wang J., and Deng R.H. New efficient user identification and key distribution scheme providing enhanced security. Computers and Security 23 8 (2004) 697-704
    • (2004) Computers and Security , vol.23 , Issue.8 , pp. 697-704
    • Yang, Y.1    Wang, S.2    Bao, F.3    Wang, J.4    Deng, R.H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.