메뉴 건너뛰기




Volumn 57, Issue 2, 2010, Pages 793-800

Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards

Author keywords

Anonymity; Authentication; Smart card; Untraceability

Indexed keywords

ANONYMITY; COMMUNICATION CHANNEL; DENIAL OF SERVICE ATTACKS; PASSWORD-AUTHENTICATED KEY AGREEMENT; THIRD PARTIES; UNTRACEABILITY;

EID: 75449106985     PISSN: 02780046     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIE.2009.2028351     Document Type: Conference Paper
Times cited : (115)

References (24)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov.
    • L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol.24, no.11, pp. 770-772, Nov. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 2
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart cards
    • W. Yang and S. Shieh, "Password authentication schemes with smart cards," Comput. Secur., vol.18, no.8, pp. 727-733, 1999.
    • (1999) Comput. Secur. , vol.18 , Issue.8 , pp. 727-733
    • Yang, W.1    Shieh, S.2
  • 3
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • S. Bellovin and M. Merritt, "Encrypted key exchange: Password-based protocols secure against dictionary attacks," in Proc. IEEE Symp. Secur. Privacy, 1992, pp. 72-84.
    • (1992) Proc. IEEE Symp. Secur. Privacy , pp. 72-84
    • Bellovin, S.1    Merritt, M.2
  • 4
    • 75449101718 scopus 로고    scopus 로고
    • [Online]. Available
    • IEEE P1363.2. [Online]. Available: http://grouper.ieee.org/groups/1363/ passwdPK/submissions.html
  • 5
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • Nov.
    • C. Fan, Y. Chan, and Z. Zhang, "Robust remote authentication scheme with smart cards," Comput. Secur., vol.24, no.8, pp. 619-628, Nov. 2005.
    • (2005) Comput. Secur. , vol.24 , Issue.8 , pp. 619-628
    • Fan, C.1    Chan, Y.2    Zhang, Z.3
  • 6
    • 62549133356 scopus 로고    scopus 로고
    • Robust and efficient passwordauthenticated key agreement using smart cards
    • Jun.
    • W. Juang, S. Chen, and H. Liaw, "Robust and efficient passwordauthenticated key agreement using smart cards," IEEE Trans. Ind. Electron., vol.15, no.6, pp. 2551-2556, Jun. 2008.
    • (2008) IEEE Trans. Ind. Electron. , vol.15 , Issue.6 , pp. 2551-2556
    • Juang, W.1    Chen, S.2    Liaw, H.3
  • 7
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Feb.
    • M.-S. Hwang and L.-H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol.46, no.1, pp. 28-30, Feb. 2000.
    • (2000) IEEE Trans. Consum. Electron. , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.-S.1    Li, L.-H.2
  • 8
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote user authentication scheme using smart cards
    • Nov.
    • H. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol.46, no.4, pp. 958-961, Nov. 2000.
    • (2000) IEEE Trans. Consum. Electron. , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.1
  • 9
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Oct.
    • C. Wu, W. Lee, and W. Tsaur, "A secure authentication scheme with anonymity for wireless communications," IEEE Commun. Lett., vol.12, no.10, pp. 722-723, Oct. 2008.
    • (2008) IEEE Commun. Lett. , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.1    Lee, W.2    Tsaur, W.3
  • 10
    • 65649112157 scopus 로고    scopus 로고
    • Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
    • Apr.
    • P. Rizomiliotis, E. Rekleitis, and S. Gritzalis, "Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags," IEEE Commun. Lett., vol.13, no.4, pp. 274-276, Apr. 2009.
    • (2009) IEEE Commun. Lett. , vol.13 , Issue.4 , pp. 274-276
    • Rizomiliotis, P.1    Rekleitis, E.2    Gritzalis, S.3
  • 11
    • 67649184080 scopus 로고    scopus 로고
    • Security flaw of authentication scheme with anonymity for wireless communications
    • May
    • J. Lee, J. Chang, and D. Lee, "Security flaw of authentication scheme with anonymity for wireless communications," IEEE Commun. Lett., vol.13, no.5, pp. 292-293, May 2009.
    • (2009) IEEE Commun. Lett. , vol.13 , Issue.5 , pp. 292-293
    • Lee, J.1    Chang, J.2    Lee, D.3
  • 12
    • 41149155794 scopus 로고    scopus 로고
    • Mobile privacy in wireless networks-revisited
    • Mar.
    • C. Tang and D. Wu, "Mobile privacy in wireless networks-revisited, " IEEE Trans. Wireless Commun., vol.7, no.3, pp. 1035-1042, Mar. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.3 , pp. 1035-1042
    • Tang, C.1    Wu, D.2
  • 13
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • Jan.
    • D. Hughes and V. Shmatikov, "Information hiding, anonymity and privacy: A modular approach," J. Comput. Secur., vol.12, no.1, pp. 3-36, Jan. 2004.
    • (2004) J. Comput. Secur. , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 17
    • 58549119455 scopus 로고    scopus 로고
    • AES software implementations on ARM7TDMI
    • M. Darnall and D. Kuhlman, "AES software implementations on ARM7TDMI," in Proc. Indocrypt, 2006, pp. 424-435.
    • (2006) Proc. Indocrypt , pp. 424-435
    • Darnall, M.1    Kuhlman, D.2
  • 18
    • 70350368313 scopus 로고    scopus 로고
    • [Online]. Available: csrc.nist.gov/groups/ST/hash/ sha-3/Round1/Feb2009/ documents/ sha3-classification-forler.pdf
    • E. Fleischmann, C. Forler1, and M. Gorski, Classification of the SHA-3 candidates. [Online]. Available: csrc.nist.gov/groups/ST/hash/ sha-3/Round1/Feb2009/documents/ sha3-classification-forler.pdf
    • Classification of the SHA-3 Candidates
    • Fleischmann, E.1    Forlerl, C.2    Gorski, M.3
  • 21
    • 74549221711 scopus 로고    scopus 로고
    • An efficient protocol for authenticated key agreement
    • Mar.
    • L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, "An efficient protocol for authenticated key agreement," Designs Codes Cryptogr., vol.28, no.2, pp. 119-134, Mar. 2003.
    • (2003) Designs Codes Cryptogr. , vol.28 , Issue.2 , pp. 119-134
    • Law, L.1    Menezes, A.2    Qu, M.3    Solinas, J.4    Vanstone, S.5
  • 24
    • 67649386419 scopus 로고    scopus 로고
    • Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards
    • Jun.
    • D. Sun, J. Huai, J. Sun, J. Li, J. Zhang, and Z. Feng, "Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards," IEEE Trans. Ind. Electron., vol.56, no.6, pp. 2284-2291, Jun. 2009.
    • (2009) IEEE Trans. Ind. Electron. , vol.56 , Issue.6 , pp. 2284-2291
    • Sun, D.1    Huai, J.2    Sun, J.3    Li, J.4    Zhang, J.5    Feng, Z.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.