메뉴 건너뛰기




Volumn 1, Issue , 2009, Pages 558-562

An efficient delegation-based anonymous authentication protocol

Author keywords

Anonymous; Authentication; ECC; Elliptic curve cryptography; Hash chain

Indexed keywords

ANONYMOUS AUTHENTICATION; AUTHENTICATION PROTOCOLS; COMPUTATIONAL LOADS; CURVE CRYPTOGRAPHY; HASH CHAINS; KEY MANAGEMENT; RESEARCH RESULTS; SECURITY FLAWS;

EID: 77950244179     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCSE.2009.731     Document Type: Conference Paper
Times cited : (2)

References (11)
  • 1
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • J. Zhuand J. Ma, "A new authentication scheme with anonymity for wireless environments," IEEE Trans. Consumer Electron., vol.50, no.1, pp. 230-234, 2004.
    • (2004) IEEE Trans. Consumer Electron. , vol.50 , Issue.1 , pp. 230-234
    • Zhuand, J.1    Ma, J.2
  • 3
    • 33751073046 scopus 로고    scopus 로고
    • A user authentication scheme with identity and location Privacy
    • S. Hirose, and S. Yoshida, "A user authentication scheme with identity and location Privacy," ACISP 2001. pp. 235-246, 2005.
    • (2005) ACISP 2001 , pp. 235-246
    • Hirose, S.1    Yoshida, S.2
  • 4
    • 33744919013 scopus 로고    scopus 로고
    • Design of anonymity-perserving user authentication and key agreement protocol for ubiquitous computing environments
    • M. H. Kang, H. B. Ryou, and W. Choi, "Design of anonymity-perserving user authentication and key agreement protocol for ubiquitous computing environments," WINE 2005. pp. 491-499, 2005.
    • (2005) WINE 2005 , pp. 491-499
    • Kang, M.H.1    Ryou, H.B.2    Choi, W.3
  • 5
    • 33744899573 scopus 로고    scopus 로고
    • New authentication protocol providing user anonymity in open network
    • Hong Kong
    • W. H. Klbt, E. J. Yoon, K. Y. Yoo, "New authentication protocol providing user anonymity in open network," WINE 2005. Hong Kong, vol.3828, pp. 414-423, 2005.
    • (2005) WINE 2005 , vol.3828 , pp. 414-423
    • Klbt, W.H.1    Yoon, E.J.2    Yoo, K.Y.3
  • 6
    • 19944362854 scopus 로고    scopus 로고
    • A new delegation-based authentication protocol for use in portable communication systems
    • W. B. Lee and C. K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Trans. Wireless Commun., vol.4, no.1, pp. 57-64, 2005.
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , Issue.1 , pp. 57-64
    • Lee, W.B.1    Yeh, C.K.2
  • 7
    • 58149108946 scopus 로고    scopus 로고
    • An Efficient Mobile Authentication Scheme for Wireless Networks
    • C. Tang, and D. O. Wu, "An Efficient Mobile Authentication Scheme for Wireless Networks," IEEE Transactions on Wireless Communications, vol.7, no.4, pp. 1408-1416, 2008.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.4 , pp. 1408-1416
    • Tang, C.1    Wu, D.O.2
  • 8
    • 41149155794 scopus 로고    scopus 로고
    • Mobile Privacy in Wireless Networks-Revisited
    • C. Tang, and D. O. Wu, "Mobile Privacy in Wireless Networks-Revisited," IEEE Transactions on Wireless Communications, vol.7, no.3, pp. 1035-1042, 2008.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.3 , pp. 1035-1042
    • Tang, C.1    Wu, D.O.2
  • 9
    • 31144445731 scopus 로고    scopus 로고
    • Technical challenges of network anonymity
    • D. Kesdogan, and C. Palmer, "Technical challenges of network anonymity," Computer Communications, vol.29, no.3, pp. 306-324, 2006.
    • (2006) Computer Communications , vol.29 , Issue.3 , pp. 306-324
    • Kesdogan, D.1    Palmer, C.2
  • 10
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • L. Lamport, "Password Authentication with Insecure Communication," Communication of ACM, vol.24, no.11, pp. 770-772, 1981.
    • (1981) Communication of ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 11
    • 0033296116 scopus 로고    scopus 로고
    • Untraceable Mobility or How to Travel Incognito
    • G. Ateniese, A. Herzberg, H. Krawczyk, et al, "Untraceable Mobility or How to Travel Incognito," Computer Networks, vol.31, no.8, pp. 785-899, 1999.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 785-899
    • Ateniese, G.1    Herzberg, A.2    Krawczyk, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.