메뉴 건너뛰기




Volumn 61, Issue 2, 2011, Pages 465-476

Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks

Author keywords

Anonymity; Authentication; Global mobility networks; Security; Smart card

Indexed keywords

ANONYMITY; AUTHENTICATION SCHEME; CLOCK SYNCHRONIZATION; EFFICIENT AUTHENTICATION; EXCLUSIVE-OR; FOREIGN AGENTS; GLOBAL MOBILITY NETWORK; HOME AGENTS; MESSAGE EXCHANGE; MOBILE USERS; MODEL CHECKING TOOLS; ONE WAY HASH FUNCTIONS; PASSWORD AUTHENTICATION; ROAMING SERVICES; SECURITY; SECURITY AND PERFORMANCE; SECURITY ATTRIBUTES; SECURITY GOALS; SECURITY PROPERTIES; STORAGE RESOURCES; TIME STAMPS; USER ANONYMITY; USER AUTHENTICATION PROTOCOLS; VARIOUS ATTACKS;

EID: 84855586177     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11277-010-0033-5     Document Type: Article
Times cited : (52)

References (20)
  • 1
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu, J. & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 230-234.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 230-234
    • Zhu, J.1    Ma, J.2
  • 2
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Lee, C. C., Hwang, M. S. & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 53(5), 1683-1687.
    • (2006) IEEE Transactions on Consumer Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 3
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Wu, C. C., Lee, W. B. & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722-723.
    • (2008) IEEE Communications Letters , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 4
    • 63649131787 scopus 로고    scopus 로고
    • On the anonymity of some authentication schemes for wireless communications
    • Zeng, P., Cao, Z., Choo, K-K. R. & Wang, S. (2009). On the anonymity of some authentication schemes for wireless communications. IEEE Communications Letters, 13(3), 170-171
    • (2009) IEEE Communications Letters , vol.13 , Issue.3 , pp. 170-171
    • Zeng, P.1    Cao, Z.2    Choo, K.-K.R.3    Wang, S.4
  • 5
    • 67649184080 scopus 로고    scopus 로고
    • Security flaw of authentication scheme with anonymity for wireless communications
    • Lee, J.-S., Chang, J. H. & Lee, D. H. (2009). Security flaw of authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 13(5), 292-293.
    • (2009) IEEE Communications Letters , vol.13 , Issue.5 , pp. 292-293
    • Lee, J.-S.1    Chang, J.H.2    Lee, D.H.3
  • 6
    • 59649101587 scopus 로고    scopus 로고
    • Enhanced authentication scheme with anonymity for roaming service in global mobility networks
    • Chang, C.-C., Lee, C.-Y. & Chiu, Y.-C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(4), 611-618.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 611-618
    • Chang, C.-C.1    Lee, C.-Y.2    Chiu, Y.-C.3
  • 7
    • 68349157387 scopus 로고    scopus 로고
    • Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
    • Youn, T.-Y., Park, Y.-H. & Lim, J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters, 13(7), 471-473.
    • (2009) IEEE Communications Letters , vol.13 , Issue.7 , pp. 471-473
    • Youn, T.-Y.1    Park, Y.-H.2    Lim, J.3
  • 8
    • 54449094667 scopus 로고    scopus 로고
    • A secure dynamic ID based remote user authentication scheme for multi-server environment
    • Liao, Y.-P. & Wang, S.-S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(1), 24-29.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.1 , pp. 24-29
    • Liao, Y.-P.1    Wang, S.-S.2
  • 9
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    • Hsiang, H.-C. & Shih, W.-K. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces, 31(6), 1118-1123.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.6 , pp. 1118-1123
    • Hsiang, H.-C.1    Shih, W.-K.2
  • 10
    • 0038218554 scopus 로고    scopus 로고
    • Secaucus, NJ, USA: Springer-Verlag New York, Inc
    • Daemen, J. & Rijmen, V. (2002). The design of rijndael. Secaucus, NJ, USA: Springer-Verlag New York, Inc.
    • (2002) The Design of Rijndael
    • Daemen, J.1    Rijmen, V.2
  • 13
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • Jiang, Y., Lin, C., Shen, X. & Shi, M. (2006). Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications, 5(9), 2569-2577.
    • (2006) IEEE Transactions on Wireless Communications , vol.5 , Issue.9 , pp. 2569-2577
    • Jiang, Y.1    Lin, C.2    Shen, X.3    Shi, M.4
  • 14
    • 0003629990 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, U.S. Department of Commerce. U.S. Federal Information Processing Standard Publication
    • National Institute of Standards and Technology, U.S. Department of Commerce. (2002). Secure Hash Standard. U.S. Federal Information Processing Standard Publication, pp. 180-182.
    • (2002) Secure Hash Standard , pp. 180-182
  • 16
    • 84855610929 scopus 로고    scopus 로고
    • IAIK Krypto Group-Description of SHA-1 Collision Search Project"
    • "IAIK Krypto Group-Description of SHA-1 Collision Search Project".
  • 18
    • 84855589035 scopus 로고    scopus 로고
    • http://www.avispa-project.org/.
  • 19
    • 67649354423 scopus 로고    scopus 로고
    • Design and verification of enhanced secure localization scheme in wireless sensor networks
    • He, D., Cui, L., Huang, H. & Ma, M. (2009a). Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(7), 1050-1058.
    • (2009) IEEE Transactions on Parallel and Distributed Systems , vol.20 , Issue.7 , pp. 1050-1058
    • He, D.1    Cui, L.2    Huang, H.3    Ma, M.4
  • 20
    • 68949121318 scopus 로고    scopus 로고
    • Secure and efficient localization scheme in ultra-wideband sensor networks
    • He, D., Cui, L., Huang, H., & Ma, M. (2009b). Secure and efficient localization scheme in ultra-wideband sensor networks. Wireless Personal Communications, 50(4), 545-561.
    • (2009) Wireless Personal Communications , vol.50 , Issue.4 , pp. 545-561
    • He, D.1    Cui, L.2    Huang, H.3    Ma, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.