-
2
-
-
26444434753
-
Security analysis of two anonymous authentication protocols for distributed wireless networks
-
Kauai Island, Hawaii
-
WONG D S. Security analysis of two anonymous authentication protocols for distributed wireless networks [A]. PerCom 2005 Workshops [C]. Kauai Island, Hawaii, 2005.
-
(2005)
PerCom 2005 Workshops
-
-
Wong, D.S.1
-
3
-
-
33744919013
-
Design of anonymity-preserving user authentication and key agreement protocol for ubiquitous computing environments
-
Hong Kong, China
-
KANG M H, RYOU H B, CHOI W. Design of anonymity-preserving user authentication and key agreement protocol for ubiquitous computing environments [A]. WINE 2005 [C]. Hong Kong, China, 2005.
-
(2005)
WINE 2005
-
-
Kang, M.H.1
Ryou, H.B.2
Choi, W.3
-
4
-
-
65649117495
-
New authentication protocol providing user anonymity in open network
-
Hong Kong, China
-
KIM W H, YOON E J, YOO K Y. New authentication protocol providing user anonymity in open network [A]. WINE 2005 [C]. Hong Kong, China, 2005.
-
(2005)
WINE 2005
-
-
Kim, W.H.1
Yoon, E.J.2
Yoo, K.Y.3
-
5
-
-
65649116341
-
An efficient authentication protocol with anonymity for wireless IP networks
-
ZHU J M, MA J F. An efficient authentication protocol with anonymity for wireless IP networks [J]. Journal of on Communications, 2004, 25(6): 12-18.
-
(2004)
Journal of on Communications
, vol.25
, Issue.6
, pp. 12-18
-
-
Zhu, J.M.1
Ma, J.F.2
-
6
-
-
33751105885
-
Security flaws and improvement to a wireless authentication protocol with anonymity
-
PENG H X, FENG D G. Security flaws and improvement to a wireless authentication protocol with anonymity [J]. Journal on Communications, 2006, 27(9): 78-85.
-
(2006)
Journal on Communications
, vol.27
, Issue.9
, pp. 78-85
-
-
Peng, H.X.1
Feng, D.G.2
-
7
-
-
33749499804
-
An identity-based authentication model for multi-domain
-
PENG H X. An identity-based authentication model for multi-domain [J]. Journal of Computers, 2006, 29(8): 1271-1281.
-
(2006)
Journal of Computers
, vol.29
, Issue.8
, pp. 1271-1281
-
-
Peng, H.X.1
-
8
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
12
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channel
-
Denmark
-
CANETTI R, KRAWCZYK H. Analysis of key-exchange protocols and their use for building secure channel [A]. Proceedings of the Euro-crypt 01 [C]. Denmark, 2001.453-474.
-
(2001)
Proceedings of the Euro-crypt 01
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
13
-
-
35048850548
-
Protocols with security proofs for mobile applications
-
Sydney, Australia
-
TIN Y S T, VASANTA H, BOYD C. Protocols with security proofs for mobile applications [A]. Proceedings of the ACISP 2004 [C]. Sydney, Australia, 2004.358-369.
-
(2004)
Proceedings of the ACISP 2004
, pp. 358-369
-
-
Tin, Y.S.T.1
Vasanta, H.2
Boyd, C.3
|