메뉴 건너뛰기




Volumn , Issue , 2010, Pages 305-312

A secure and lightweight user authentication scheme with anonymity for the global mobility network

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION SCHEME; COMMUNICATION EFFICIENCY; EXCLUSIVE-OR; FOREIGN AGENTS; GLOBAL MOBILITY NETWORK; HIGH EFFICIENCY; HOME AGENTS; MOBILE USERS; ONE WAY HASH FUNCTIONS; PASSWORD AUTHENTICATION; SECURITY ATTRIBUTES; SESSION KEY; STORAGE RESOURCES; USER ANONYMITY; USER AUTHENTICATION PROTOCOLS; USER AUTHENTICATION SCHEME; USER FRIENDLY;

EID: 78650493958     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NBiS.2010.34     Document Type: Conference Paper
Times cited : (9)

References (27)
  • 1
    • 0031257939 scopus 로고    scopus 로고
    • An authentication technique based on distributed security management for the global mobility network
    • S. Suzukiz and K. Nakada, "An authentication technique based on distributed security management for the global mobility network," IEEE Journal on Selected Areas in Communications, vol. 15, no. 8, pp.1608-1617, 1997.
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.8 , pp. 1608-1617
    • Suzukiz, S.1    Nakada, K.2
  • 2
    • 0033907037 scopus 로고    scopus 로고
    • Extensions to an authentication technique proposed for the global mobility network
    • L. Buttyan, C. Gbaguidi, S. Staamann, and U. Wilhelm, "Extensions to an authentication technique proposed for the global mobility network," IEEE Transactions on Communications, vol. 48, no. 3, pp.373-376, 2000.
    • (2000) IEEE Transactions on Communications , vol.48 , Issue.3 , pp. 373-376
    • Buttyan, L.1    Gbaguidi, C.2    Staamann, S.3    Wilhelm, U.4
  • 3
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • J. Zhu and J. Ma, "A new authentication scheme with anonymity for wireless environments," IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp.230-234, 2004.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 230-234
    • Zhu, J.1    Ma, J.2
  • 4
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • C. C. Lee, M. S. Hwang, and I. E. Liao, "Security enhancement on a new authentication scheme with anonymity for wireless environments," IEEE Transactions on Consumer Electronics, vol. 53, no. 5, pp.1683-1687, 2006.
    • (2006) IEEE Transactions on Consumer Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 5
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • C. C. Wu, W. B. Lee, and W. J. Tsaur, "A secure authentication scheme with anonymity for wireless communications," IEEE Communication Letter, vol. 12, no. 10, pp.722-723, 2008.
    • (2008) IEEE Communication Letter , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 6
    • 63649131787 scopus 로고    scopus 로고
    • On the anonymity of some authentication schemes for wireless communications
    • P. Zeng, Z. Cao, K-K. R. Choo, and S. Wang, "On the anonymity of some authentication schemes for wireless communications," IEEE Communication Letter, vol. 13, no. 3, pp.170-171, 2009.
    • (2009) IEEE Communication Letter , vol.13 , Issue.3 , pp. 170-171
    • Zeng, P.1    Cao, Z.2    Choo, K.-K.R.3    Wang, S.4
  • 7
    • 67649184080 scopus 로고    scopus 로고
    • Security flaw of authentication scheme with anonymity for wireless communications
    • J.-S. Lee, J. H. Chang, and D. H. Lee, "Security flaw of authentication scheme with anonymity for wireless communications," IEEE Communication Letter, vol. 13, no. 5, pp.292-293, 2009.
    • (2009) IEEE Communication Letter , vol.13 , Issue.5 , pp. 292-293
    • Lee, J.-S.1    Chang, J.H.2    Lee, D.H.3
  • 8
    • 59649101587 scopus 로고    scopus 로고
    • Enhanced authentication scheme with anonymity for roaming service in global mobility networks
    • C.-C. Chang, C.-Y. Lee, and Y.-C. Chiu, "Enhanced authentication scheme with anonymity for roaming service in global mobility networks," Computer Communications, vol. 32, no. 4, pp.611-618, 2009.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 611-618
    • Chang, C.-C.1    Lee, C.-Y.2    Chiu, Y.-C.3
  • 9
    • 54449094667 scopus 로고    scopus 로고
    • A secure dynamic ID based remote user authentication scheme for multi-server environment
    • Y.-P. Liao and S.-S. Wang, "A secure dynamic ID based remote user authentication scheme for multi-server environment," Computer Standards & Interfaces, vol. 31, pp. 24-29, 2009.
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 24-29
    • Liao, Y.-P.1    Wang, S.-S.2
  • 10
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    • H.-C. Hsiang and W.-K. Shih, "Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment," Computer Standards & Interfaces, vol. 31, no. 6, pp. 1118-1123, 2009.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.6 , pp. 1118-1123
    • Hsiang, H.-C.1    Shih, W.-K.2
  • 11
    • 84855586177 scopus 로고    scopus 로고
    • Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks
    • DOI: 10.1007/s11277-010-0033-5
    • D. He, S. Chan, C. Chen, J. Bu, R. Fan, "Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks," Wireless Personal Communications, 2010, DOI: 10.1007/s11277-010-0033-5.
    • (2010) Wireless Personal Communications
    • He, D.1    Chan, S.2    Chen, C.3    Bu, J.4    Fan, R.5
  • 12
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • J. Xu, W.-T. Zhu, and D.-G. Feng, "An improved smart card based password authentication scheme with provable security," Computer Standards & Interfaces, vol. 31, no. 4, pp.723-728, 2009.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.-T.2    Feng, D.-G.3
  • 14
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Transactions on Computer, vol. 51, no. 5, pp. 541-552, 2002.
    • (2002) IEEE Transactions on Computer , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 15
    • 0003629990 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, U.S. Department of Commerce, "," U.S. Federal Information Processing Standard Publication 180-2
    • National Institute of Standards and Technology, U.S. Department of Commerce, "Secure Hash Standard," U.S. Federal Information Processing Standard Publication 180-2, 2002.
    • (2002) Secure Hash Standard
  • 16
    • 33845214903 scopus 로고    scopus 로고
    • Cryptanalysis of a flexible remote user authentication scheme using smart cards
    • W.-C. Ku and S.-M. Chen, "Cryptanalysis of a flexible remote user authentication scheme using smart cards," ACM Operating Systems Review, vol.39, no. 1, pp. 90-96, 2005.
    • (2005) ACM Operating Systems Review , vol.39 , Issue.1 , pp. 90-96
    • Ku, W.-C.1    Chen, S.-M.2
  • 17
    • 67649354423 scopus 로고    scopus 로고
    • Design and verification of enhanced secure localization scheme in wireless sensor networks
    • D. He, L. Cui, H. Huang, and M. Ma, "Design and verification of enhanced secure localization scheme in wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 7, pp. 1050-1058, 2009.
    • (2009) IEEE Transactions on Parallel and Distributed Systems , vol.20 , Issue.7 , pp. 1050-1058
    • He, D.1    Cui, L.2    Huang, H.3    Ma, M.4
  • 18
    • 68949121318 scopus 로고    scopus 로고
    • Secure and efficient localization scheme in ultra-wideband sensor networks
    • D. He, L. Cui, H. Huang, and M. Ma, "Secure and efficient localization scheme in ultra-wideband sensor networks," Wireless Personal Communications, vol. 50, no. 4, pp. 545-561, 2009.
    • (2009) Wireless Personal Communications , vol.50 , Issue.4 , pp. 545-561
    • He, D.1    Cui, L.2    Huang, H.3    Ma, M.4
  • 19
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • to appear
    • D. He, Y. Gao, S. Chan, C. Chen, and J. Bu, "An enhanced two-factor user authentication scheme in wireless sensor networks," Ad Hoc & Sensor Wireless Networks, to appear, 2010.
    • (2010) Ad Hoc & Sensor Wireless Networks
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 21
    • 0042913090 scopus 로고    scopus 로고
    • A secure and efficient conference scheme for mobile communications
    • X. Yi, C. K. Siew, and C. H. Tan, "A secure and efficient conference scheme for mobile communications," IEEE Transactions on Vehicular Technology, vol. 52, no. 4, pp.784-793, 2003.
    • (2003) IEEE Transactions on Vehicular Technology , vol.52 , Issue.4 , pp. 784-793
    • Yi, X.1    Siew, C.K.2    Tan, C.H.3
  • 22
    • 0003614758 scopus 로고
    • Digital signature and public key functions as intractable as factorization
    • M. O. Rabin, "Digital signature and public key functions as intractable as factorization," MIT Laboratory Computer Science, MIT/LCS/TR-212, 1979.
    • (1979) MIT Laboratory Computer Science, MIT/LCS/TR-212
    • Rabin, M.O.1
  • 23
    • 0019080452 scopus 로고
    • A modification of the RSA public key encryption procedure
    • H. C.Williams, "A modification of the RSA public key encryption procedure," IEEE Transactions on Information Theory, vol. 26, no. 6, pp. 726-729, 1980.
    • (1980) IEEE Transactions on Information Theory , vol.26 , Issue.6 , pp. 726-729
    • Williams, H.C.1
  • 24
    • 0041619709 scopus 로고    scopus 로고
    • Integer factoring
    • Mar.
    • A. K. Lenstra, "Integer factoring, "Design, Code and Cryptography, vol. 19, no. 2/3, pp. 101-128, Mar. 2000.
    • (2000) Design, Code and Cryptography , vol.19 , Issue.2-3 , pp. 101-128
    • Lenstra, A.K.1
  • 25
    • 84956985315 scopus 로고    scopus 로고
    • Recent progress and prospects for integer factorization algorithm
    • Sydney, Australia, July
    • R. P. Brent, 'Recent progress and prospects for integer factorization algorithm," In Proc. COCOON2000, Sydney, Australia, pp. 3-22, July 2000.
    • (2000) Proc. COCOON2000 , pp. 3-22
    • Brent, R.P.1
  • 26
    • 78650450336 scopus 로고    scopus 로고
    • "OpenSSL," http://www.openssl.org.
    • OpenSSL


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.