메뉴 건너뛰기




Volumn 9, Issue 1, 2010, Pages 168-174

Universal authentication protocols for anonymous wireless communications

Author keywords

Anonymity; Authentication; Key establishment; Privacy; Revocation; Secure roaming

Indexed keywords

AUTHENTICATION PROTOCOLS; CELLULAR NETWORK; CONVENTIONAL APPROACH; HOME SERVERS; KEY ESTABLISHMENTS; MOBILE SYSTEMS; NEW APPROACHES; SESSION KEY; SIGNALING FLOW; SYSTEM COMPLEXITY; THREE-PARTY; USER ANONYMITY; USER REVOCATION; WIRELESS COMMUNICATIONS;

EID: 74549210063     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2010.01.081219     Document Type: Article
Times cited : (131)

References (28)
  • 2
    • 84937579774 scopus 로고    scopus 로고
    • The oracle Diffie-Hellman assumptions and an analysis of DHIES
    • M. Abdalla, M. Bellare, and P. Rogaway, "The oracle Diffie-Hellman assumptions and an analysis of DHIES," in CT-RSA, pp. 143-158, 2001.
    • (2001) CT-RSA , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 5
    • 35048876343 scopus 로고    scopus 로고
    • Security proofs for identity-based identification and signature schemes
    • M. Bellare, C. Namprempre, and G. Neven, "Security proofs for identity-based identification and signature schemes," in Proc. EUROCRYPT 2004, pp. 268-286.
    • (2004) Proc. EUROCRYPT , pp. 268-286
    • Bellare, M.1    Namprempre, C.2    Neven, G.3
  • 6
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Fairfax, ACM
    • M. Bellare and P. Rogaway, "Random oracles are practical: a paradigm for designing efficient protocols," in Proc. First ACM Conf. Computer Commun. Security, pp. 62-73, Fairfax, 1993, ACM.
    • (1993) Proc. First ACM Conf. Computer Commun. Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 26444503680 scopus 로고
    • European Telecommunications Standards Institute (ETSI)
    • European Telecommunications Standards Institute (ETSI), GSM 02.09: Security Aspects, 1993.
    • (1993) GSM 02.09: Security Aspects
  • 11
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • Apr.
    • S. Goldwasser and S. Micali, "Probabilistic encryption," J. Computer Syst. Sci., vol.28, no.2, pp. 270-299, Apr. 1984.
    • (1984) J. Computer Syst. Sci. , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 12
    • 3042783229 scopus 로고    scopus 로고
    • A self-encryption mechanism for authentication of roaming and teleconference services
    • Mar.
    • K. F. Hwang and C. C. Chang, "A self-encryption mechanism for authentication of roaming and teleconference services," IEEE Trans. Wireless Commun., vol.2, no.2, pp. 400-407, Mar. 2003.
    • (2003) IEEE Trans. Wireless Commun. , vol.2 , Issue.2 , pp. 400-407
    • Hwang, K.F.1    Chang, C.C.2
  • 13
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov.
    • L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol.24, no.11, pp. 770-771, Nov. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-771
    • Lamport, L.1
  • 14
    • 1842715081 scopus 로고    scopus 로고
    • The advantages of elliptic curve cryptography for wireless security
    • K. Lauter, "The advantages of elliptic curve cryptography for wireless security," IEEE Wireless Commun., vol.11, pp. 62-67, 2004.
    • (2004) IEEE Wireless Commun , vol.11 , pp. 62-67
    • Lauter, K.1
  • 15
    • 7244236291 scopus 로고    scopus 로고
    • Localised authentication for internetwork roaming across wireless LANs
    • M. Long, C. H. Wu, and J. D. Irwin, "Localised authentication for internetwork roaming across wireless LANs," IEE Proc. Commun., vol.151, no.5, pp. 496-500, 2004.
    • (2004) IEE Proc. Commun. , vol.151 , Issue.5 , pp. 496-500
    • Long, M.1    Wu, C.H.2    Irwin, J.D.3
  • 18
    • 0029451888 scopus 로고
    • Untraceability in mobile networks
    • D. Samfat, R. Molva, and N. Asokan, "Untraceability in mobile networks," in MobiCom '95, pp. 26-36, 1995.
    • (1995) MobiCom '95 , pp. 26-36
    • Samfat, D.1    Molva, R.2    Asokan, N.3
  • 19
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • CRYPTO 1984, Springer
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in CRYPTO 1984, vol.196, Lecture Notes Comput. Sci., pp. 47-53. Springer, 1985.
    • (1985) Lecture Notes Comput. Sci. , vol.196 , pp. 47-53
    • Shamir, A.1
  • 23
    • 35449005656 scopus 로고    scopus 로고
    • Anonymous and authenticated key exchange for roaming networks
    • G. Yang, D. S. Wong, and X. Deng, "Anonymous and authenticated key exchange for roaming networks," IEEE Trans. Wireless Commun., vol.6, no.9, pp. 3461-3472, 2007.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.9 , pp. 3461-3472
    • Yang, G.1    Wong, D.S.2    Deng, X.3
  • 24
    • 44349157189 scopus 로고    scopus 로고
    • Formal security definition and efficient construction for roaming with a privacy-preserving extension
    • G. Yang, D. S. Wong, and X. Deng, "Formal security definition and efficient construction for roaming with a privacy-preserving extension," J. Universal Comput. Sci., vol.14, no.3, pp. 441-462, 2008.
    • (2008) J. Universal Comput. Sci. , vol.14 , Issue.3 , pp. 441-462
    • Yang, G.1    Wong, D.S.2    Deng, X.3
  • 26
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun., vol.4, no.2, pp. 734-742, 2005.
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.1    Fang, Y.2
  • 27
    • 55149100626 scopus 로고    scopus 로고
    • SLAB: Secure localized authentication and billing scheme for wireless mesh networks
    • H. Zhu, X. Lin, R. Lu, Pin-Han Ho, and X. Shen, "SLAB: secure localized authentication and billing scheme for wireless mesh networks," IEEE Trans. Wireless Commun., vol.17, no.10, pp. 3858-3868, 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.17 , Issue.10 , pp. 3858-3868
    • Zhu, H.1    Lin, X.2    Lu, R.3    Ho, P.4    Shen, X.5
  • 28
    • 34248229210 scopus 로고    scopus 로고
    • An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
    • R. W. Zhu, G. Yang, and D. S. Wong, "An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices," Theor. Comput. Sci., vol.378, no.2, pp. 198-207, 2007.
    • (2007) Theor. Comput. Sci. , vol.378 , Issue.2 , pp. 198-207
    • Zhu, R.W.1    Yang, G.2    Wong, D.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.