메뉴 건너뛰기




Volumn 21, Issue 5, 2011, Pages 384-401

A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION SCHEME; COMPUTATIONAL COSTS; GLOBAL MOBILITY NETWORK; ROAMING SERVICES;

EID: 80053053849     PISSN: 10557148     EISSN: 10991190     Source Type: Journal    
DOI: 10.1002/nem.764     Document Type: Article
Times cited : (7)

References (25)
  • 1
    • 0031257939 scopus 로고    scopus 로고
    • An authentication technique based on distributed security management for the global mobility network
    • PII S0733871697060836
    • Suzukiz S, Nakada K,. An authentication technique based on distributed security management for the global mobility network. IEEE Journal Selected Areas in Communications 1997; 15 (8): 1608-1617. (Pubitemid 127583971)
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.8 , pp. 1608-1617
    • Suzuki, S.1    Nakada, K.2
  • 2
    • 0033907037 scopus 로고    scopus 로고
    • Extensions to an authentication technique proposed for the global mobility network
    • DOI 10.1109/26.837039
    • Buttyan L, Gbaguidi C, Staamann S, Wilhelm U,. Extensions to an authentication technique proposed for the global mobility network. IEEE Transactions on Communications 2000; 48 (3): 373-376. (Pubitemid 30589215)
    • (2000) IEEE Transactions on Communications , vol.48 , Issue.3 , pp. 373-376
    • Buttyan, L.1    Gbaguidi, C.2    Staamann, S.3    Wilhelm, U.4
  • 3
    • 0035135698 scopus 로고    scopus 로고
    • Authentication of mobile users in third generation mobile system
    • Tzeng ZJ, Tzeng WG,. Authentication of mobile users in third generation mobile system. Wireless Personal Communications 2001; 16 (1): 35-50.
    • (2001) Wireless Personal Communications , vol.16 , Issue.1 , pp. 35-50
    • Tzeng, Z.J.1    Tzeng, W.G.2
  • 4
    • 3042783229 scopus 로고    scopus 로고
    • A self-encryption mechanism for authentication of roaming and teleconference services
    • Hwang KF, Chang CC,. A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Transactions on Wireless Communications 2003; 2 (2): 400-407.
    • (2003) IEEE Transactions on Wireless Communications , vol.2 , Issue.2 , pp. 400-407
    • Hwang, K.F.1    Chang, C.C.2
  • 5
    • 78650860311 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • (in press)
    • He D, Ma M, Zhang Y, Chen C, Bu J,. A strong user authentication scheme with smart cards for wireless communications. Computer Communications 2010 (in press).
    • (2010) Computer Communications
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5
  • 6
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu J, Ma J,. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004; 50 (1): 230-234.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 230-234
    • Zhu, J.1    Ma, J.2
  • 7
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Lee CC, Hwang MS, Liao IE,. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006; 53 (5): 1683-1687.
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 8
    • 59649101587 scopus 로고    scopus 로고
    • Enhanced authentication scheme with anonymity for roaming service in global mobility networks
    • Chang C-C, Lee C-Y, Chiu Y-C,. Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 2009; 32: 611-618.
    • (2009) Computer Communications , vol.32 , pp. 611-618
    • Chang, C.-C.1    Lee, C.-Y.2    Chiu, Y.-C.3
  • 9
    • 80053052870 scopus 로고    scopus 로고
    • An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    • (in press)
    • Xu J, Zhu W-T, Feng D-G,. An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications 2010 (in press).
    • (2010) Computer Communications
    • Xu, J.1    Zhu, W.-T.2    Feng, D.-G.3
  • 10
    • 68349157387 scopus 로고    scopus 로고
    • Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
    • Youn T-Y, Park Y-H, Lim J,. Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters 2009; 13 (7): 471-473.
    • (2009) IEEE Communications Letters , vol.13 , Issue.7 , pp. 471-473
    • Youn, T.-Y.1    Park, Y.-H.2    Lim, J.3
  • 14
    • 73249134721 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, US Department of Commerce. Secure Hash Standard
    • National Institute of Standards and Technology, US Department of Commerce. Secure Hash Standard. US Federal Information Processing Standard Publication, 2002; 180-2.
    • (2002) US Federal Information Processing Standard Publication , pp. 180-182
  • 18
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • Messerges TS, Dabbish EA, Sloan RH,. Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51 (5): 541-552. (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 25
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • DOI 10.1109/TMC.2006.16
    • Potlapally NR, Ravi S, Raghunathan A, Jha NK,. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing 2006; 5 (2): 128-143. (Pubitemid 43671073)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.