메뉴 건너뛰기




Volumn 5, Issue 4, 2009, Pages 1069-1080

A robust authentication scheme with user anonymity for wireless environments

Author keywords

Anonymity; Authentication; Logic analysis; Password; Smart card; Wireless communications

Indexed keywords


EID: 64149102436     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (30)

References (25)
  • 1
    • 0028272762 scopus 로고
    • Privacy and authentication for wireless local area networks
    • A. Aziz and W. Diffie, Privacy and authentication for wireless local area networks, IEEE Personal Communications, vol.1, no.l, pp.24-31, 1994.
    • (1994) IEEE Personal Communications , vol.1 , Issue.L , pp. 24-31
    • Aziz, A.1    Diffie, W.2
  • 8
    • 84958780603 scopus 로고    scopus 로고
    • Authentication and payment in future mobile systems, Computer Security - ESORICS'98
    • G. Horn and B. Preneel, Authentication and payment in future mobile systems, Computer Security - ESORICS'98, LNCS 1485, pp.277-293, 1998.
    • (1998) LNCS , vol.1485 , pp. 277-293
    • Horn, G.1    Preneel, B.2
  • 9
    • 0035281433 scopus 로고    scopus 로고
    • An efficient anonymous channel protocol in wireless communications
    • J.-K. Jan and W.-D. Lin, An efficient anonymous channel protocol in wireless communications, IEICE Transactions on Communications, vol.E84-B, pp.484-491, 2001.
    • (2001) IEICE Transactions on Communications , vol.E84-B , pp. 484-491
    • Jan, J.-K.1    Lin, W.-D.2
  • 10
    • 0033365053 scopus 로고    scopus 로고
    • Anonymous channel and authentication in wireless communications
    • W.-S. Juang, C.-L. Lei, and C.-Y. Chang, Anonymous channel and authentication in wireless communications, Computer Communications, vol.22, no.15-16, pp.1502-1511, 1999.
    • (1999) Computer Communications , vol.22 , Issue.15-16 , pp. 1502-1511
    • Juang, W.-S.1    Lei, C.-L.2    Chang, C.-Y.3
  • 12
    • 63849290284 scopus 로고    scopus 로고
    • W.-K. Lai, C.-S. Shieh, and Y.-C. Kuo, Reliable broadcasting in ad hoc wireless networks with mac mini-slots and directional antennas, International Journal of Innovative Computing, Information and Control, 3, no.6(A), pp.1487-1500, 2007.
    • W.-K. Lai, C.-S. Shieh, and Y.-C. Kuo, Reliable broadcasting in ad hoc wireless networks with mac mini-slots and directional antennas, International Journal of Innovative Computing, Information and Control, vol.3, no.6(A), pp.1487-1500, 2007.
  • 13
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • C.-C. Lee, M.-S. Hwang, and I-E. Liao, Security enhancement on a new authentication scheme with anonymity for wireless environments, IEEE Transactions on Industrial Electronics, vol.53, no.5, pp. 1683-1687, 2006.
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.-C.1    Hwang, M.-S.2    Liao, I.-E.3
  • 14
    • 34547877223 scopus 로고    scopus 로고
    • Secure communications for cluster-based ad hoc networks using node identities
    • J.-S. Lee and C.-C. Chang, Secure communications for cluster-based ad hoc networks using node identities, Journal of Network and Computer Applications, vol.30, no.4, pp.1377-1396, 2007.
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.4 , pp. 1377-1396
    • Lee, J.-S.1    Chang, C.-C.2
  • 15
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart card security under the threat of power analysis attacks
    • T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Examining smart card security under the threat of power analysis attacks, IEEE Transactions on Computers, vol.51, no.5, pp.541-552, 2002.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 16
    • 4544241048 scopus 로고    scopus 로고
    • IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks
    • S. Minghui, S. Xuemin, and J. W. Mark, IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks, IEEE Wireless Communications, vol.11, no.4, pp.66-75, 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.4 , pp. 66-75
    • Minghui, S.1    Xuemin, S.2    Mark, J.W.3
  • 17
    • 84957794888 scopus 로고    scopus 로고
    • Forward secrecy and its application to future mobile communication security
    • Proc. of the Third International Workshop on Practice and Theory in Public Key Cryptosystems
    • D. G. Park, C. Boyd, and S. J. Moon, Forward secrecy and its application to future mobile communication security, Proc. of the Third International Workshop on Practice and Theory in Public Key Cryptosystems, LNCS 1751, pp.433-445, 2000.
    • (2000) LNCS , vol.1751 , pp. 433-445
    • Park, D.G.1    Boyd, C.2    Moon, S.J.3
  • 20
  • 21
    • 38149099184 scopus 로고    scopus 로고
    • A simple and efficient key exchange scheme against the smart card loss problem
    • EUC Workshops 2001
    • R.-C. Wang, W.-S. Juang, and C.-L. Lei, A simple and efficient key exchange scheme against the smart card loss problem, EUC Workshops 2001, LNCS 4809, pp.728-744, 2007.
    • (2007) LNCS , vol.4809 , pp. 728-744
    • Wang, R.-C.1    Juang, W.-S.2    Lei, C.-L.3
  • 22
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • X. M. Wang, W.-F. Zhang, J.-S. Zhang, and M.-K. Khan, Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards, Computer Standards & Interfaces, vol.29, pp.507-512, 2007.
    • (2007) Computer Standards & Interfaces , vol.29 , pp. 507-512
    • Wang, X.M.1    Zhang, W.-F.2    Zhang, J.-S.3    Khan, M.-K.4
  • 24
    • 25844519837 scopus 로고    scopus 로고
    • A secure and efficient authentication protocol for anonymous channel in wireless communications
    • C.-C. Yang, Y.-L. Tang, R.-C. Wang, and H.-W. Yang, A secure and efficient authentication protocol for anonymous channel in wireless communications, Applied Mathematics and Computation, vol.169, pp. 1431-1439, 2005.
    • (2005) Applied Mathematics and Computation , vol.169 , pp. 1431-1439
    • Yang, C.-C.1    Tang, Y.-L.2    Wang, R.-C.3    Yang, H.-W.4
  • 25
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • J. Zhu and J. Ma, A new authentication scheme with anonymity for wireless environments, IEEE Transactions on Consumer Electronics, vol.50, no.l, pp.230-234, 2004.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.L , pp. 230-234
    • Zhu, J.1    Ma, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.