메뉴 건너뛰기




Volumn 30, Issue 9, 2009, Pages 29-35

Trusted and anonymous authentication scheme for wireless networks

Author keywords

Remote attestation; Trusted computing; Wireless authentication protocols

Indexed keywords

ANONYMOUS AUTHENTICATION; AUTHENTICATION PROTOCOLS; COMPUTATION COSTS; KEY AGREEMENT; MESSAGE EXCHANGE; REMOTE ATTESTATION; SEPARATION PROPERTY; TIME SECRET KEY; TRUSTED COMPUTING; USER IDENTITY; WIRELESS AUTHENTICATION PROTOCOLS; WIRELESS IP NETWORKS;

EID: 70350525668     PISSN: 1000436X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (12)

References (24)
  • 1
    • 33749468315 scopus 로고    scopus 로고
    • Mobile terminal security
    • OLIVIER B, NORA D, LAURENT G. Mobile terminal security[EB/OL]. http://eprint.iacr.org/2004/158.pdf, 2005.
    • (2005)
    • Olivier, B.1    Nora, D.2    Laurent, G.3
  • 3
    • 4544286919 scopus 로고    scopus 로고
    • Privacy and authentication protocol providing anonymous channels in GSM
    • ALBERTO P. Privacy and authentication protocol providing anonymous channels in GSM[J]. Computer Communications, 2004, 27: 1709-1715.
    • (2004) Computer Communications , vol.27 , pp. 1709-1715
    • Alberto, P.1
  • 4
    • 37549067642 scopus 로고    scopus 로고
    • Improvement of mobile IP registration using self-certified public keys
    • DANG L J, KOU W D, ZHANG J, et al. Improvement of mobile IP registration using self-certified public keys[J]. IEEE Transactions on Mobile Computing, 2007, 1(4): 167-173.
    • (2007) IEEE Transactions on Mobile Computing , vol.1 , Issue.4 , pp. 167-173
    • Dang, L.J.1    Kou, W.D.2    Zhang, J.3
  • 5
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • JIANG Y, LIN C, SHEN X M, et al. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks[J]. IEEE Transactions on Wireless Communications, 2006, 5(9): 2569-2577.
    • (2006) IEEE Transactions on Wireless Communications , vol.5 , Issue.9 , pp. 2569-2577
    • Jiang, Y.1    Lin, C.2    Shen, X.M.3
  • 7
    • 65649116341 scopus 로고    scopus 로고
    • An efficient authentication protocol with anonymity for wireless IP networks
    • ZHU J M, MA J F. An efficient authentication protocol with anonymity for wireless IP networks[J]. Journal on Communications, 2004, 25(6): 12-18.
    • (2004) Journal on Communications , vol.25 , Issue.6 , pp. 12-18
    • Zhu, J.M.1    Ma, J.F.2
  • 8
    • 33751105885 scopus 로고    scopus 로고
    • Security flaws and improvement to a wireless authentication protocol with anonymity
    • PENG H X, FENG D G. Security flaws and improvement to a wireless authentication protocol with anonymity[J]. Journal on Communications, 2006, 27(9): 78-85.
    • (2006) Journal on Communications , vol.27 , Issue.9 , pp. 78-85
    • Peng, H.X.1    Feng, D.G.2
  • 9
    • 33749482809 scopus 로고    scopus 로고
    • Trusted computing based user authentication for mobile equipment
    • ZHENG Y, HE D K, HE M X. Trusted computing based user authentication for mobile equipment[J]. Chinese Journal of Computers, 2006, 29(8): 1255-1264.
    • (2006) Chinese Journal of Computers , vol.29 , Issue.8 , pp. 1255-1264
    • Zheng, Y.1    He, D.K.2    He, M.X.3
  • 10
    • 21644486314 scopus 로고    scopus 로고
    • TCG specification architecture overview
    • Trusted computing group
    • Trusted computing group. TCG specification architecture overview[EB/OL]. http://www.trustedcomputinggroup.org, 2007.
    • (2007)
  • 11
    • 24944506569 scopus 로고    scopus 로고
    • Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy
    • iTrust 2005, LNCS 3477
    • PEARSON S. Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy[A]. iTrust 2005, LNCS 3477[C]. 2005. 305-320.
    • (2005) , pp. 305-320
    • Pearson, S.1
  • 12
    • 23844501750 scopus 로고    scopus 로고
    • Trusted computing-path to security or road to servitude
    • SARAH H. Trusted computing-path to security or road to servitude?[J]. Infosecurity Today, 2004, 1(4): 18-21.
    • (2004) Infosecurity Today , vol.1 , Issue.4 , pp. 18-21
    • Sarah, H.1
  • 13
    • 23444451451 scopus 로고    scopus 로고
    • Trusted computing and open source
    • Information Security Technical Report
    • DAVID S, MIMI Z. Trusted Computing and Open Source[R]. Information Security Technical Report, 2005. 74-82.
    • (2005) , pp. 74-82
    • David, S.1    Mimi, Z.2
  • 14
    • 23444450925 scopus 로고    scopus 로고
    • Trusted computing group history
    • Information Security Technical Report
    • BRIAN B. Trusted Computing Group History[R]. Information Security Technical Report, 2005. 59-62.
    • (2005) , pp. 59-62
    • Brian, B.1
  • 17
    • 20444411497 scopus 로고    scopus 로고
    • Research on trustworthy networks
    • LIN C, PENG X H. Research on trustworthy networks[J]. Chinese Journal of Computers, 2005, 28(5): 751-758.
    • (2005) Chinese Journal of Computers , vol.28 , Issue.5 , pp. 751-758
    • Lin, C.1    Peng, X.H.2
  • 18
    • 70350559847 scopus 로고    scopus 로고
    • TPM main specifications - Part 1. Design principles
    • Trusted computing group
    • Trusted computing group. TPM main specifications-part 1 design principles[EB/OL]. http://www.trustedcomputinggroup.org, 2007.
    • (2007)
  • 19
    • 70350556613 scopus 로고    scopus 로고
    • Trusted computing platform alliance (TCPA) main specification
    • Trusted computing group
    • Trusted computing group. Trusted computing platform alliance (TCPA) main specification[EB/OL]. http://www.trustedcomputinggroup.org, 2001.
    • (2001)
  • 20
    • 0003629991 scopus 로고
    • Secure hash standard (SHA-1)
    • FIPS PUB 180-1
    • Secure Hash Standard (SHA-1)[S]. FIPS PUB 180-1; 1995.
    • (1995)
  • 23
    • 70350531758 scopus 로고    scopus 로고
    • TCG PC client specific implementation specification for conventional BIOS
    • Trusted computing group
    • Trusted computing group. TCG PC client specific implementation specification for conventional BIOS[EB/OL]. http://www.trustedcomputinggroup.org, 2005.
    • (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.