메뉴 건너뛰기




Volumn 28, Issue 4, 2013, Pages 732-742

A generic framework for anonymous authentication in mobile networks

Author keywords

key agreement; password authentication; roaming service; user anonymity; wireless security

Indexed keywords

KEY AGREEMENT; PASSWORD AUTHENTICATION; ROAMING SERVICES; USER ANONYMITY; WIRELESS SECURITY;

EID: 84880049034     PISSN: 10009000     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11390-013-1371-z     Document Type: Article
Times cited : (4)

References (18)
  • 1
    • 0031257939 scopus 로고    scopus 로고
    • An authentication technique based on distributed security management for the global mobility network
    • 10.1109/49.634798
    • Suzukiz S, Nakada K (1997) An authentication technique based on distributed security management for the global mobility network. IEEE Journal on Selected Areas in Communications 15(8):1608-1617
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.8 , pp. 1608-1617
    • Suzukiz, S.1    Nakada, K.2
  • 3
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • 10.1109/TWC.2006.05063
    • Jiang Y, Lin C, Shen X, Shi M (2006) Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications 5(9):2569-2577
    • (2006) IEEE Transactions on Wireless Communications , vol.5 , Issue.9 , pp. 2569-2577
    • Jiang, Y.1    Lin, C.2    Shen, X.3    Shi, M.4
  • 6
    • 41149155794 scopus 로고    scopus 로고
    • Mobile privacy in wireless networks-revisited
    • 10.1109/TWC.2008.060802
    • Tang C, Wu DO (2008) Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications 7(3):1035-1042
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.3 , pp. 1035-1042
    • Tang, C.1    Wu, D.O.2
  • 7
    • 56749160373 scopus 로고    scopus 로고
    • A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks
    • March 31-April 2
    • Wan Z G, Ren K, Preneel B. A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. In Proc. The 1st ACM Conference on Wireless Network Security (WiSec 2008), March 31-April 2, 2008, pp.62-67.
    • (2008) Proc. The 1st ACM Conference on Wireless Network Security (WiSec 2008) , pp. 62-67
    • Wan, Z.G.1    Ren, K.2    Preneel, B.3
  • 8
    • 35449005656 scopus 로고    scopus 로고
    • Anonymous and authenticated key exchange for roaming networks
    • 10.1109/TWC.2007.06020042
    • Yang G, Wong DS, Deng X (2007) Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications 6(9):3461-3472
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.9 , pp. 3461-3472
    • Yang, G.1    Wong, D.S.2    Deng, X.3
  • 9
    • 84855586177 scopus 로고    scopus 로고
    • Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks
    • 10.1007/s11277-010-0033-5
    • He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications 61(2):465-472
    • (2011) Wireless Personal Communications , vol.61 , Issue.2 , pp. 465-472
    • He, D.1    Chan, S.2    Chen, C.3    Bu, J.4    Fan, R.5
  • 10
    • 82755189733 scopus 로고    scopus 로고
    • A novel user authentication and privacy preserving scheme with smart cards for wireless communications
    • 2865092 1245.94099 10.1016/j.mcm.2011.01.010
    • Li CT, Lee CC (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling 55(1/2):35-44
    • (2012) Mathematical and Computer Modelling , vol.55 , Issue.12 , pp. 35-44
    • Li, C.T.1    Lee, C.C.2
  • 11
    • 79951676054 scopus 로고    scopus 로고
    • Privacy-preserving universal authentication protocol for wireless communications
    • 10.1109/TWC.2010.120610.101018
    • He D, Bu J, Chan S, Chen C, Yin M (2011) Privacy-preserving universal authentication protocol for wireless communications. IEEE Trans Wireless Communications 10(2):431-436
    • (2011) IEEE Trans. Wireless Communications , vol.10 , Issue.2 , pp. 431-436
    • He, D.1    Bu, J.2    Chan, S.3    Chen, C.4    Yin, M.5
  • 12
    • 2542616812 scopus 로고    scopus 로고
    • The quest for personal control over mobile location privacy
    • 10.1109/MCOM.2004.1299356
    • He Q, Wu D, Khosla P (2004) The quest for personal control over mobile location privacy. IEEE Communications Magazine 42(5):130-136
    • (2004) IEEE Communications Magazine , vol.42 , Issue.5 , pp. 130-136
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 14
    • 79959689122 scopus 로고    scopus 로고
    • A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
    • 10.1109/TPDS.2010.206
    • Huang XY, Xiang Y, Chonka A et al (2011) A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Trans Parallel and Distributed Systems 22(8):1390-1397
    • (2011) IEEE Trans. Parallel and Distributed Systems , vol.22 , Issue.8 , pp. 1390-1397
    • Huang, X.Y.1    Xiang, Y.2    Chonka, A.3
  • 15
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • 10.1016/j.csi.2008.09.006
    • Xu J, Zhu WT, Feng DG (2009) An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31(4):723-728
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 16
    • 78751645363 scopus 로고    scopus 로고
    • Robust authentication and key agreement scheme preserving the privacy of secret key
    • 10.1016/j.comcom.2010.04.005
    • Wang RC, Juang WS, Lei CL (2011) Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications 34(3):274-280
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 274-280
    • Wang, R.C.1    Juang, W.S.2    Lei, C.L.3
  • 17
    • 0003855464 scopus 로고    scopus 로고
    • 2 John Wiley & Sons, Inc. New York
    • Schneier B (1996) Applied Cryptography, 2nd edn. John Wiley & Sons, Inc., New York
    • (1996) Applied Cryptography
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.