메뉴 건너뛰기




Volumn 34, Issue 3, 2011, Pages 367-374

A strong user authentication scheme with smart cards for wireless communications

Author keywords

Anonymity; Authentication; Security; Smart card; Wireless networks

Indexed keywords

ANONYMITY; AUTHENTICATION PROTOCOLS; AUTHENTICATION SCHEME; COMMUNICATION EFFICIENCY; ENCRYPTION/DECRYPTION; FOREIGN AGENTS; HIGH EFFICIENCY; HOME AGENTS; HOME NETWORKS; LIGHT WEIGHT; LOW POWER; MESSAGE EXCHANGE; MOBILE USERS; PASSWORD AUTHENTICATION; PERFORMANCE ANALYSIS; SEAMLESS ROAMING; SECURITY; SECURITY ANALYSIS; SECURITY ATTRIBUTES; SECURITY WEAKNESS; SESSION KEY; USER ANONYMITY; USER AUTHENTICATION SCHEME; WIRELESS COMMUNICATIONS;

EID: 78751648745     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2010.02.031     Document Type: Article
Times cited : (187)

References (17)
  • 1
    • 0346895307 scopus 로고    scopus 로고
    • Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    • C.-S. Park Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks 44 2004 267 273
    • (2004) Computer Networks , vol.44 , pp. 267-273
    • Park, C.-S.1
  • 2
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng An efficient and practical solution to remote authentication: smart card Computers & Security 21 4 2002 372 375
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.-Y.1    Jan, J.-K.2    Tseng, Y.-M.3
  • 3
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • C.C. Lee, M.S. Hwang, and I.E. Liao Security enhancement on a new authentication scheme with anonymity for wireless environments IEEE Transactions on Consumer Electronics 53 5 2006 1683 1687
    • (2006) IEEE Transactions on Consumer Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 4
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • C.C. Wu, W.B. Lee, and W.J. Tsaur A secure authentication scheme with anonymity for wireless communications IEEE Communication Letter 12 10 2008 722 723
    • (2008) IEEE Communication Letter , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 5
    • 63649131787 scopus 로고    scopus 로고
    • On the anonymity of some authentication schemes for wireless communications
    • P. Zeng, Z. Cao, K.-K.R. Choo, and S. Wang On the anonymity of some authentication schemes for wireless communications IEEE Communication Letter 13 3 2009 170 171
    • (2009) IEEE Communication Letter , vol.13 , Issue.3 , pp. 170-171
    • Zeng, P.1    Cao, Z.2    Choo, K.-K.R.3    Wang, S.4
  • 6
    • 67649184080 scopus 로고    scopus 로고
    • Security flaw of authentication scheme with anonymity for wireless communications
    • J.-S. Lee, J.H. Chang, and D.H. Lee Security flaw of authentication scheme with anonymity for wireless communications IEEE Communication Letter 13 5 2009 292 293
    • (2009) IEEE Communication Letter , vol.13 , Issue.5 , pp. 292-293
    • Lee, J.-S.1    Chang, J.H.2    Lee, D.H.3
  • 7
    • 68949149518 scopus 로고    scopus 로고
    • Security flaws in authentication protocols with anonymity for wireless environments
    • J. Xu, and D. Feng Security flaws in authentication protocols with anonymity for wireless environments ETRI Journal 31 4 2009 460 462
    • (2009) ETRI Journal , vol.31 , Issue.4 , pp. 460-462
    • Xu, J.1    Feng, D.2
  • 8
    • 49849096355 scopus 로고    scopus 로고
    • Efficient multi-server authentication scheme based on one-way hash function without verification table
    • J.-L. Tsai Efficient multi-server authentication scheme based on one-way hash function without verification table Computers & Security 27 3-4 2008 115 121
    • (2008) Computers & Security , vol.27 , Issue.34 , pp. 115-121
    • Tsai, J.-L.1
  • 9
    • 54449094667 scopus 로고    scopus 로고
    • A secure dynamic ID based remote user authentication scheme for multi-server environment
    • Y.-P. Liao, and S.-S. Wang A secure dynamic ID based remote user authentication scheme for multi-server environment Computer Standards & Interfaces 31 1 2009 24 29
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.1 , pp. 24-29
    • Liao, Y.-P.1    Wang, S.-S.2
  • 10
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    • H.-C. Hsiang, and W.-K. Shih Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment Computer Standards & Interfaces 31 6 2009
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.6
    • Hsiang, H.-C.1    Shih, W.-K.2
  • 11
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart-card security under the threat of power analysis attacks IEEE Transactions on Computer 51 5 2002 541 552
    • (2002) IEEE Transactions on Computer , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 13
    • 78751642913 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, US Department of Commerce, Secure Hash Standard, US Federal Information Processing Standard Publication 180-2, 2002
    • National Institute of Standards and Technology, US Department of Commerce, Secure Hash Standard, US Federal Information Processing Standard Publication 180-2, 2002.
  • 15
    • 33645091897 scopus 로고    scopus 로고
    • Sizzle: A standards-based end-to-end security architecture for the embedded Internet
    • V. Gupta, and M. Wurm Sizzle: a standards-based end-to-end security architecture for the embedded Internet Pervasive and Mobile Computing 1 4 2005 425 445
    • (2005) Pervasive and Mobile Computing , vol.1 , Issue.4 , pp. 425-445
    • Gupta, V.1    Wurm, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.