메뉴 건너뛰기




Volumn 32, Issue 4, 2009, Pages 611-618

Enhanced authentication scheme with anonymity for roaming service in global mobility networks

Author keywords

Authentication; Energy consumption; Key agreement; Roaming; The forgery attack

Indexed keywords

ACCESS CONTROL; MOBILE DEVICES; PORTABLE EQUIPMENT; TELECOMMUNICATION EQUIPMENT; WIRELESS NETWORKS;

EID: 59649101587     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.11.032     Document Type: Article
Times cited : (179)

References (21)
  • 1
    • 0031257939 scopus 로고    scopus 로고
    • An authentication technique based on distributed security management for the global mobility network
    • Suzukiz S., and Nakada K. An authentication technique based on distributed security management for the global mobility network. IEEE Journal Selected Areas in Communications 15 8 (1997) 1608-1617
    • (1997) IEEE Journal Selected Areas in Communications , vol.15 , Issue.8 , pp. 1608-1617
    • Suzukiz, S.1    Nakada, K.2
  • 2
    • 0033907037 scopus 로고    scopus 로고
    • Extensions to an authentication technique proposed for the global mobility network
    • Buttyan L., Gbaguidi C., Staamann S., and Wilhelm U. Extensions to an authentication technique proposed for the global mobility network. IEEE Transactions on Communications 48 3 (2000) 373-376
    • (2000) IEEE Transactions on Communications , vol.48 , Issue.3 , pp. 373-376
    • Buttyan, L.1    Gbaguidi, C.2    Staamann, S.3    Wilhelm, U.4
  • 3
    • 0035135698 scopus 로고    scopus 로고
    • Authentication of mobile users in third generation mobile system
    • Tzeng Z.J., and Tzeng W.G. Authentication of mobile users in third generation mobile system. Wireless Personal Communications 16 1 (2001) 35-50
    • (2001) Wireless Personal Communications , vol.16 , Issue.1 , pp. 35-50
    • Tzeng, Z.J.1    Tzeng, W.G.2
  • 4
    • 3042783229 scopus 로고    scopus 로고
    • A self-encryption mechanism for authentication of roaming and teleconference services
    • Hwang K.F., and Chang C.C. A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Transactions on Wireless Communications 2 2 (2003) 400-407
    • (2003) IEEE Transactions on Wireless Communications , vol.2 , Issue.2 , pp. 400-407
    • Hwang, K.F.1    Chang, C.C.2
  • 5
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu J., and Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50 1 (2004) 230-234
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 230-234
    • Zhu, J.1    Ma, J.2
  • 7
    • 33947102781 scopus 로고    scopus 로고
    • C.Y. Lee, C.C. Chang, C.H. Lin, User authentication with anonymity for global mobility networks, in: Proceedings of IEE Mobility Conference 2005: The Second Asia Pacific Conference on Mobile Technology, Applications and Systems, Guangzhou, China, 2005, pp. 3-1B-6:1-5.
    • C.Y. Lee, C.C. Chang, C.H. Lin, User authentication with anonymity for global mobility networks, in: Proceedings of IEE Mobility Conference 2005: The Second Asia Pacific Conference on Mobile Technology, Applications and Systems, Guangzhou, China, 2005, pp. 3-1B-6:1-5.
  • 8
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Lee C.C., Hwang M.S., and Liao I.E. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53 5 (2006) 1683-1687
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 11
    • 0003629990 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, U.S. Department of Commerce, U.S. Federal Information Processing Standard Publication 180-2
    • National Institute of Standards and Technology, U.S. Department of Commerce, "Secure Hash Standard," U.S. Federal Information Processing Standard Publication 180-2, 2002.
    • (2002) Secure Hash Standard
  • 13
    • 0003508558 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, U.S. Department of Commerce, U.S. Federal Information Processing Standard Publication 197
    • National Institute of Standards and Technology, U.S. Department of Commerce, "Advanced Encryption Standard," U.S. Federal Information Processing Standard Publication 197, 2001.
    • (2001) Advanced Encryption Standard
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R.L., Shamir A., and Adleman L.M. A method for obtaining digital signatures and public-key cryptosystems. Communications of ACM 21 2 (1978) 120-126
    • (1978) Communications of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 21
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • Potlapally N.R., Ravi S., Raghunathan A., and Jha N.K. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing 5 2 (2006) 128-143
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.