메뉴 건너뛰기




Volumn 30, Issue 4, 2009, Pages 130-136

ID-based wireless authentication scheme with anonymity

Author keywords

Anonymity; Cryptography; Unauthenticated links adversarial model; Wireless network

Indexed keywords

ANONYMITY; AUTHENTICATION SCHEMES; BILINEARITY; FORMAL APPROACHES; ID-BASED; SECURITY OF AUTHENTICATIONS; UNAUTHENTICATED-LINKS ADVERSARIAL MODEL;

EID: 65649133914     PISSN: 1000436X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (13)

References (13)
  • 2
    • 26444434753 scopus 로고    scopus 로고
    • Security analysis of two anonymous authentication protocols for distributed wireless networks
    • Kauai Island, Hawaii
    • WONG D S. Security analysis of two anonymous authentication protocols for distributed wireless networks [A]. PerCom 2005 Workshops [C]. Kauai Island, Hawaii, 2005.
    • (2005) PerCom 2005 Workshops
    • Wong, D.S.1
  • 3
    • 33744919013 scopus 로고    scopus 로고
    • Design of anonymity-preserving user authentication and key agreement protocol for ubiquitous computing environments
    • Hong Kong, China
    • KANG M H, RYOU H B, CHOI W. Design of anonymity-preserving user authentication and key agreement protocol for ubiquitous computing environments [A]. WINE 2005 [C]. Hong Kong, China, 2005.
    • (2005) WINE 2005
    • Kang, M.H.1    Ryou, H.B.2    Choi, W.3
  • 4
    • 65649117495 scopus 로고    scopus 로고
    • New authentication protocol providing user anonymity in open network
    • Hong Kong, China
    • KIM W H, YOON E J, YOO K Y. New authentication protocol providing user anonymity in open network [A]. WINE 2005 [C]. Hong Kong, China, 2005.
    • (2005) WINE 2005
    • Kim, W.H.1    Yoon, E.J.2    Yoo, K.Y.3
  • 5
    • 65649116341 scopus 로고    scopus 로고
    • An efficient authentication protocol with anonymity for wireless IP networks
    • ZHU J M, MA J F. An efficient authentication protocol with anonymity for wireless IP networks [J]. Journal of on Communications, 2004, 25(6): 12-18.
    • (2004) Journal of on Communications , vol.25 , Issue.6 , pp. 12-18
    • Zhu, J.M.1    Ma, J.F.2
  • 6
    • 33751105885 scopus 로고    scopus 로고
    • Security flaws and improvement to a wireless authentication protocol with anonymity
    • PENG H X, FENG D G. Security flaws and improvement to a wireless authentication protocol with anonymity [J]. Journal on Communications, 2006, 27(9): 78-85.
    • (2006) Journal on Communications , vol.27 , Issue.9 , pp. 78-85
    • Peng, H.X.1    Feng, D.G.2
  • 7
    • 33749499804 scopus 로고    scopus 로고
    • An identity-based authentication model for multi-domain
    • PENG H X. An identity-based authentication model for multi-domain [J]. Journal of Computers, 2006, 29(8): 1271-1281.
    • (2006) Journal of Computers , vol.29 , Issue.8 , pp. 1271-1281
    • Peng, H.X.1
  • 8
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 12
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channel
    • Denmark
    • CANETTI R, KRAWCZYK H. Analysis of key-exchange protocols and their use for building secure channel [A]. Proceedings of the Euro-crypt 01 [C]. Denmark, 2001.453-474.
    • (2001) Proceedings of the Euro-crypt 01 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 13
    • 35048850548 scopus 로고    scopus 로고
    • Protocols with security proofs for mobile applications
    • Sydney, Australia
    • TIN Y S T, VASANTA H, BOYD C. Protocols with security proofs for mobile applications [A]. Proceedings of the ACISP 2004 [C]. Sydney, Australia, 2004.358-369.
    • (2004) Proceedings of the ACISP 2004 , pp. 358-369
    • Tin, Y.S.T.1    Vasanta, H.2    Boyd, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.