메뉴 건너뛰기




Volumn 2, Issue 5, 2009, Pages 427-444

A survey of anonymity in wireless communication systems

Author keywords

Ad hoc networks; Anonymity; Authentication; Routing; Temporary identity; Untraceability; Wireless networks

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; SURVEYS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 70350234578     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.78     Document Type: Article
Times cited : (30)

References (31)
  • 5
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • Jiang Y, Lin C, Shen X, Shi M. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications 2006; 5(9): 2569-2577.
    • (2006) IEEE Transactions on Wireless Communications , vol.5 , Issue.9 , pp. 2569-2577
    • Jiang, Y.1    Lin, C.2    Shen, X.3    Shi, M.4
  • 7
    • 0346895307 scopus 로고    scopus 로고
    • Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    • Park C-S. Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems. Computer Networks 2004; 44(2): 267-273.
    • (2004) Computer Networks , vol.44 , Issue.2 , pp. 267-273
    • Park, C.-S.1
  • 9
    • 0347380855 scopus 로고    scopus 로고
    • Wireless location privacy protection
    • Schilit B, Hong J, Gruteser M. Wireless location privacy protection. Computer 2003; 36(12): 135-137.
    • (2003) Computer , vol.36 , Issue.12 , pp. 135-137
    • Schilit, B.1    Hong, J.2    Gruteser, M.3
  • 17
    • 0003568551 scopus 로고    scopus 로고
    • November 1997; Available online at, http://www.csl.sri.com/users/millen/capsl/library.html
    • Clark J, Jacob J. A survey of authentication protocol literature: version 1.0. November 1997; Available online at: http://www.cs.york.ac.uk/jac/papers/drareview.ps.gz or http://www.csl.sri.com/users/millen/capsl/library.html
    • A survey of authentication protocol literature: Version 1.0
    • Clark, J.1    Jacob, J.2
  • 19
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Lee C-C, Hwang M-S, Liao I-E. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006; 53(5): 1683-1687.
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.-C.1    Hwang, M.-S.2    Liao, I.-E.3
  • 20
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu J, Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004; 50(1): 231-235.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 231-235
    • Zhu, J.1    Ma, J.2
  • 21
    • 70350217693 scopus 로고    scopus 로고
    • Cryptanalysis of Park's authentication protocol in wireless mobile communication systems
    • Dominguez AP. Cryptanalysis of Park's authentication protocol in wireless mobile communication systems. International Journal of Network Security 2006; 3(3): 279-282.
    • (2006) International Journal of Network Security , vol.3 , Issue.3 , pp. 279-282
    • Dominguez, A.P.1
  • 22
    • 26444495514 scopus 로고    scopus 로고
    • Kim K. Wireless authentication protocols preserving user anonymity
    • Oiso, Japan, 23-26 January
    • Go J, Kim K. Wireless authentication protocols preserving user anonymity. Proceedings of the 2001 Symposium on Cryptography and Information Security, Oiso, Japan, Vol. 1, 23-26 January 2001; 159-164.
    • Proceedings of the 2001 Symposium on Cryptography and Information Security , vol.1 , pp. 159-164
    • Go, J.1
  • 24
    • 0042913090 scopus 로고    scopus 로고
    • YiX,SiewK,TanCH.Asecureandefficientconferencescheme for mobile communications
    • YiX,SiewK,TanCH.Asecureandefficientconferencescheme for mobile communications. IEEE Transactions on Vehicular Technology 2003; 52(4): 784-793.
    • (2003) IEEE Transactions on Vehicular Technology , vol.52 , Issue.4 , pp. 784-793
  • 27
    • 34347244961 scopus 로고    scopus 로고
    • An identity-free and on demand routing scheme against anonymity threats in mobile ad-hoc networks
    • Kong J, Hong X, Gerla M. An identity-free and on demand routing scheme against anonymity threats in mobile ad-hoc networks. IEEE Transaction on Mobile Computing 2007; 6(8): 888-902.
    • (2007) IEEE Transaction on Mobile Computing , vol.6 , Issue.8 , pp. 888-902
    • Kong, J.1    Hong, X.2    Gerla, M.3
  • 28
  • 29
    • 84933037276 scopus 로고    scopus 로고
    • ITU-T. Rec. X.509 (revised) the Directory, International Telecommunication Union, Geneva, Switzerland, (equivalent to ISO/IEC 9594-8:1995)
    • ITU-T. Rec. X.509 (revised) the Directory--Authentication Framework, International Telecommunication Union, Geneva, Switzerland, (equivalent to ISO/IEC 9594-8:1995), 1993.
    • Authentication Framework , pp. 1993


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.