-
1
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
J. Zhuand J. Ma, "A new authentication scheme with anonymity for wireless environments," IEEE Trans. Consumer Electron., vol.50, no.1, pp. 230-234, 2004.
-
(2004)
IEEE Trans. Consumer Electron.
, vol.50
, Issue.1
, pp. 230-234
-
-
Zhuand, J.1
Ma, J.2
-
3
-
-
33751073046
-
A user authentication scheme with identity and location Privacy
-
S. Hirose, and S. Yoshida, "A user authentication scheme with identity and location Privacy," ACISP 2001. pp. 235-246, 2005.
-
(2005)
ACISP 2001
, pp. 235-246
-
-
Hirose, S.1
Yoshida, S.2
-
4
-
-
33744919013
-
Design of anonymity-perserving user authentication and key agreement protocol for ubiquitous computing environments
-
M. H. Kang, H. B. Ryou, and W. Choi, "Design of anonymity-perserving user authentication and key agreement protocol for ubiquitous computing environments," WINE 2005. pp. 491-499, 2005.
-
(2005)
WINE 2005
, pp. 491-499
-
-
Kang, M.H.1
Ryou, H.B.2
Choi, W.3
-
5
-
-
33744899573
-
New authentication protocol providing user anonymity in open network
-
Hong Kong
-
W. H. Klbt, E. J. Yoon, K. Y. Yoo, "New authentication protocol providing user anonymity in open network," WINE 2005. Hong Kong, vol.3828, pp. 414-423, 2005.
-
(2005)
WINE 2005
, vol.3828
, pp. 414-423
-
-
Klbt, W.H.1
Yoon, E.J.2
Yoo, K.Y.3
-
6
-
-
19944362854
-
A new delegation-based authentication protocol for use in portable communication systems
-
W. B. Lee and C. K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Trans. Wireless Commun., vol.4, no.1, pp. 57-64, 2005.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, Issue.1
, pp. 57-64
-
-
Lee, W.B.1
Yeh, C.K.2
-
7
-
-
58149108946
-
An Efficient Mobile Authentication Scheme for Wireless Networks
-
C. Tang, and D. O. Wu, "An Efficient Mobile Authentication Scheme for Wireless Networks," IEEE Transactions on Wireless Communications, vol.7, no.4, pp. 1408-1416, 2008.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.4
, pp. 1408-1416
-
-
Tang, C.1
Wu, D.O.2
-
8
-
-
41149155794
-
Mobile Privacy in Wireless Networks-Revisited
-
C. Tang, and D. O. Wu, "Mobile Privacy in Wireless Networks-Revisited," IEEE Transactions on Wireless Communications, vol.7, no.3, pp. 1035-1042, 2008.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.3
, pp. 1035-1042
-
-
Tang, C.1
Wu, D.O.2
-
9
-
-
31144445731
-
Technical challenges of network anonymity
-
D. Kesdogan, and C. Palmer, "Technical challenges of network anonymity," Computer Communications, vol.29, no.3, pp. 306-324, 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.3
, pp. 306-324
-
-
Kesdogan, D.1
Palmer, C.2
-
10
-
-
0019634370
-
Password Authentication with Insecure Communication
-
L. Lamport, "Password Authentication with Insecure Communication," Communication of ACM, vol.24, no.11, pp. 770-772, 1981.
-
(1981)
Communication of ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
11
-
-
0033296116
-
Untraceable Mobility or How to Travel Incognito
-
G. Ateniese, A. Herzberg, H. Krawczyk, et al, "Untraceable Mobility or How to Travel Incognito," Computer Networks, vol.31, no.8, pp. 785-899, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 785-899
-
-
Ateniese, G.1
Herzberg, A.2
Krawczyk, H.3
|