메뉴 건너뛰기




Volumn 55, Issue 1-2, 2012, Pages 35-44

A novel user authentication and privacy preserving scheme with smart cards for wireless communications

Author keywords

Mobile computing; Remote user authentication; Security; Smart cards; User anonymity; Wireless networks

Indexed keywords

ANONYMITY PROPERTY; AUTHENTICATION SCHEME; EAVESDROPPING ATTACKS; KEY AGREEMENT; MOBILE WIRELESS NETWORKING; PRIVACY PRESERVING; REMOTE USER AUTHENTICATION; SECURITY; SECURITY WEAKNESS; USER ANONYMITY; USER AUTHENTICATION; USER AUTHENTICATION SCHEME; WIRELESS COMMUNICATIONS;

EID: 82755189733     PISSN: 08957177     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mcm.2011.01.010     Document Type: Article
Times cited : (112)

References (23)
  • 2
    • 46749113953 scopus 로고    scopus 로고
    • A new authentication protocol based on pointer forwarding for mobile communications
    • Lee C.C., Hwang M.S., Liao I.E. A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communications and Mobile Computing 2008, 8(5):661-672.
    • (2008) Wireless Communications and Mobile Computing , vol.8 , Issue.5 , pp. 661-672
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 4
    • 59649101587 scopus 로고    scopus 로고
    • Enhanced authentication scheme with anonymity for roaming service in global networks
    • Chang C.C., Lee C.Y., Chiu Y.C. Enhanced authentication scheme with anonymity for roaming service in global networks. Computer Communications 2009, 32(4):611.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 611
    • Chang, C.C.1    Lee, C.Y.2    Chiu, Y.C.3
  • 5
    • 78650860311 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • (in press).
    • D. He, M. Ma, Y. Zhang, C. Chen, J. Bu, A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 2010 (in press).
    • (2010) Computer Communications
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5
  • 6
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Lee C.C., Hwang M.S., Liao I.E. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006, 53(5):1683-1686.
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1686
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 7
    • 67649184080 scopus 로고    scopus 로고
    • Security flaw of authentication scheme with anonymity for wireless communications
    • Lee J.S., Chang J.H., Lee D.H. Security flaw of authentication scheme with anonymity for wireless communications. IEEE Communications Letters 2009, 13(5):292-293.
    • (2009) IEEE Communications Letters , vol.13 , Issue.5 , pp. 292-293
    • Lee, J.S.1    Chang, J.H.2    Lee, D.H.3
  • 8
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Wu C.C., Lee W.B., Tsaur W.J. A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters 2008, 12(10):722-723.
    • (2008) IEEE Communications Letters , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 9
    • 68949149518 scopus 로고    scopus 로고
    • Security flaws in authentication protocols with anonymity for wireless communications
    • Xu J., Feng D. Security flaws in authentication protocols with anonymity for wireless communications. ETRI Journal 2009, 31(4):460-462.
    • (2009) ETRI Journal , vol.31 , Issue.4 , pp. 460-462
    • Xu, J.1    Feng, D.2
  • 10
    • 63649131787 scopus 로고    scopus 로고
    • On the anonymity of some authentication schemes for wireless communications
    • Zeng P., Cao Z., Choo K.K.R., Wang S. On the anonymity of some authentication schemes for wireless communications. IEEE Communications Letters 2009, 13(3):170-171.
    • (2009) IEEE Communications Letters , vol.13 , Issue.3 , pp. 170-171
    • Zeng, P.1    Cao, Z.2    Choo, K.K.R.3    Wang, S.4
  • 11
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu J., Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004, 51(1):230-234.
    • (2004) IEEE Transactions on Consumer Electronics , vol.51 , Issue.1 , pp. 230-234
    • Zhu, J.1    Ma, J.2
  • 12
    • 84855329586 scopus 로고    scopus 로고
    • On the anonymity of an enhanced authentication scheme for a roaming service in global mobility networks, International Journal of Secure Digital Information Age
    • (in press).
    • C.C. Lee, R.X. Chang, T. Williams, On the anonymity of an enhanced authentication scheme for a roaming service in global mobility networks, International Journal of Secure Digital Information Age, 2010 (in press).
    • (2010)
    • Lee, C.C.1    Chang, R.X.2    Williams, T.3
  • 13
    • 82755178201 scopus 로고    scopus 로고
    • An improvement of remote authentication and key agreement schemes, Journal of Circuits, Systems, and Computers
    • (in press).
    • C.C. Lee, C.T. Li, K.Y. Huang, S.Y. Huang, An improvement of remote authentication and key agreement schemes, Journal of Circuits, Systems, and Computers, 2010 (in press).
    • (2010)
    • Lee, C.C.1    Li, C.T.2    Huang, K.Y.3    Huang, S.Y.4
  • 14
    • 70349809938 scopus 로고    scopus 로고
    • Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks
    • Li C.T., Chu Y.P. Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks. International Journal of Network Security 2009, 8(2):166-168.
    • (2009) International Journal of Network Security , vol.8 , Issue.2 , pp. 166-168
    • Li, C.T.1    Chu, Y.P.2
  • 15
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • Li C.T., Hwang M.S. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2010, 33(1):1-5.
    • (2010) Journal of Network and Computer Applications , vol.33 , Issue.1 , pp. 1-5
    • Li, C.T.1    Hwang, M.S.2
  • 16
  • 18
    • 80052436479 scopus 로고    scopus 로고
    • A secure billing service with two-factor user authentication in wireless sensor networks, International Journal of Innovative Computing
    • (in press).
    • C.T. Li, C.C. Lee, L.J. Wang, C.J. Liu, A secure billing service with two-factor user authentication in wireless sensor networks, International Journal of Innovative Computing, Information and Control, 2010 (in press).
    • (2010) Information and Control.
    • Li, C.T.1    Lee, C.C.2    Wang, L.J.3    Liu, C.J.4
  • 19
    • 77952310897 scopus 로고    scopus 로고
    • On the security enhancement of an efficient and secure event signature protocol for P2P MMOGs
    • The 2010 International Conference on Computational Science and Its Applications
    • Li C.T., Lee C.C., Wang L.J. On the security enhancement of an efficient and secure event signature protocol for P2P MMOGs. Lecture Notes in Computer Science 2010, vol. 6016:599-609.
    • (2010) Lecture Notes in Computer Science , vol.6016 , pp. 599-609
    • Li, C.T.1    Lee, C.C.2    Wang, L.J.3
  • 20
    • 77952308617 scopus 로고    scopus 로고
    • A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels
    • Li C.T., Lee C.C., Wang L.J. A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels. Journal of Information Assurance and Security 2010, 5(2):201-208.
    • (2010) Journal of Information Assurance and Security , vol.5 , Issue.2 , pp. 201-208
    • Li, C.T.1    Lee, C.C.2    Wang, L.J.3
  • 21
    • 74349090986 scopus 로고    scopus 로고
    • A secure event update protocol for peer-to-peer massively multiplayer online games against masquerade attacks
    • Li C.T., Wei C.H., Chin Y.H. A secure event update protocol for peer-to-peer massively multiplayer online games against masquerade attacks. International Journal of Innovative Computing, Information and Control 2009, 5(12(A)):4715-4723.
    • (2009) International Journal of Innovative Computing, Information and Control , vol.5 , Issue.12 A , pp. 4715-4723
    • Li, C.T.1    Wei, C.H.2    Chin, Y.H.3
  • 23
    • 80053052870 scopus 로고    scopus 로고
    • An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    • (in press).
    • J. Xu, W.T. Zhu, D.G. Feng, An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks, Computer Communications, 2010 (in press).
    • (2010) Computer Communications
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.