-
1
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
M.-X. Zhang, and Y.-G. Fang Security analysis and enhancements of 3GPP authentication and key agreement protocol IEEE Trans. Wireless Commun. 4 2 2005 734 742
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.-X.1
Fang, Y.-G.2
-
2
-
-
33748196456
-
Man-in-the-middle attack on the authentication of the user from the remote autonomous object
-
C.-Y. Yang, C.-C. Lee, and S.-Y. Hsiao Man-in-the-middle attack on the authentication of the user from the remote autonomous object Int. J. Netw. Secur. 1 2 2005 81 83
-
(2005)
Int. J. Netw. Secur.
, vol.1
, Issue.2
, pp. 81-83
-
-
Yang, C.-Y.1
Lee, C.-C.2
Hsiao, S.-Y.3
-
3
-
-
0037942544
-
Cryptanalysis of mutual authentication and key exchange for low power wireless communications
-
K. Shim Cryptanalysis of mutual authentication and key exchange for low power wireless communications IEEE Commun. Lett. 7 5 2003 248 250
-
(2003)
IEEE Commun. Lett.
, vol.7
, Issue.5
, pp. 248-250
-
-
Shim, K.1
-
4
-
-
2442620328
-
Comments on mutual authentication and key exchange protocols for low power wireless communications
-
S.L. Ng, and C. Mitchell Comments on mutual authentication and key exchange protocols for low power wireless communications IEEE Commun. Lett. 8 4 2004 262 263
-
(2004)
IEEE Commun. Lett.
, vol.8
, Issue.4
, pp. 262-263
-
-
Ng, S.L.1
Mitchell, C.2
-
5
-
-
59649083248
-
A more efficient and secure dynamic ID-based remote user authentication scheme
-
Y.-Y. Wang, J.-Y. Liu, F.-X. Xiao, and J. Dan A more efficient and secure dynamic ID-based remote user authentication scheme Computer Commun. 32 4 2009 583 585
-
(2009)
Computer Commun.
, vol.32
, Issue.4
, pp. 583-585
-
-
Wang, Y.-Y.1
Liu, J.-Y.2
Xiao, F.-X.3
Dan, J.4
-
6
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
K.-F. Hwang, and C.-C. Chang A self-encryption mechanism for authentication of roaming and teleconference services IEEE Trans. Wireless Commun. 2 2 2003 400 407
-
(2003)
IEEE Trans. Wireless Commun.
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.-F.1
Chang, C.-C.2
-
7
-
-
61849096169
-
More secure remote user authentication scheme
-
S.-K. Kima, and M.-G. Chung More secure remote user authentication scheme Computer Commun. 32 6 2009 1018 1021
-
(2009)
Computer Commun.
, vol.32
, Issue.6
, pp. 1018-1021
-
-
Kima, S.-K.1
Chung, M.-G.2
-
8
-
-
2142759434
-
End-to-end security protocol for mobile communications with end-user identification/authentication
-
C.-C. Chang, K.-L. Chen, and M.-S. Hwang End-to-end security protocol for mobile communications with end-user identification/authentication Wireless Pers. Commun. 28 2 2004 95 106
-
(2004)
Wireless Pers. Commun.
, vol.28
, Issue.2
, pp. 95-106
-
-
Chang, C.-C.1
Chen, K.-L.2
Hwang, M.-S.3
-
9
-
-
0036409380
-
An improvement of mobile users authentication in the integration environments
-
M.-S. Hwang, C.-C. Lee, and W.-P. Yang An improvement of mobile users authentication in the integration environments Int. J. Electron. Commun. 56 5 2002 293 297
-
(2002)
Int. J. Electron. Commun.
, vol.56
, Issue.5
, pp. 293-297
-
-
Hwang, M.-S.1
Lee, C.-C.2
Yang, W.-P.3
-
10
-
-
0345306310
-
A new privacy and authentication protocol for end-to-end mobile users
-
C.-C. Lee, C.-C. Yang, and M.-S. Hwang A new privacy and authentication protocol for end-to-end mobile users Int. J. Commun. Syst. 16 9 2003 799 808
-
(2003)
Int. J. Commun. Syst.
, vol.16
, Issue.9
, pp. 799-808
-
-
Lee, C.-C.1
Yang, C.-C.2
Hwang, M.-S.3
-
11
-
-
0035135698
-
Authentication of mobile users in third generation mobile system
-
Z.-J. Tzeng, and W.-G. Tzeng Authentication of mobile users in third generation mobile system Wireless Pers. Commun. 16 1 2001 35 50
-
(2001)
Wireless Pers. Commun.
, vol.16
, Issue.1
, pp. 35-50
-
-
Tzeng, Z.-J.1
Tzeng, W.-G.2
-
12
-
-
0033907037
-
Extensions to an authentication technique proposed for the global mobility network
-
L. Buttyan, C. Gbaguidi, S. Staamann, and U. Wilhelm Extensions to an authentication technique proposed for the global mobility network IEEE Trans. Commun. 48 3 2000 373 376
-
(2000)
IEEE Trans. Commun.
, vol.48
, Issue.3
, pp. 373-376
-
-
Buttyan, L.1
Gbaguidi, C.2
Staamann, S.3
Wilhelm, U.4
-
13
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
J. Zhu, and J. Ma A new authentication scheme with anonymity for wireless environments IEEE Trans. Consum. Electron. 50 1 2004 230 234
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.1
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
-
14
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
C.-C. Lee, and M.-S. Hwang Security enhancement on a new authentication scheme with anonymity for wireless environments IEEE Trans. Indus. Electron. 53 5 2006 1683 1686
-
(2006)
IEEE Trans. Indus. Electron.
, vol.53
, Issue.5
, pp. 1683-1686
-
-
Lee, C.-C.1
Hwang, M.-S.2
-
15
-
-
26444495514
-
Wireless authentication protocol preserving user anonymity
-
January
-
J. Park, J. Go, K. Kim, Wireless authentication protocol preserving user anonymity, in: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001), vol. 26, January 2001, pp. 159-164.
-
(2001)
Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001)
, vol.26
, pp. 159-164
-
-
Park, J.1
Go, J.2
Kim, K.3
|