-
1
-
-
0031257939
-
An authentication technique based on distributed security management for the global mobility network
-
10.1109/49.634798
-
Suzukiz S, Nakada K (1997) An authentication technique based on distributed security management for the global mobility network. IEEE Journal on Selected Areas in Communications 15(8):1608-1617
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzukiz, S.1
Nakada, K.2
-
2
-
-
70350234578
-
A survey of anonymity in wireless communication systems
-
10.1002/sec.78
-
Chen H, Xiao Y, Hong X, Hu F, Xie JL (2009) A survey of anonymity in wireless communication systems. Security and Communication Networks 2(5):427-444
-
(2009)
Security and Communication Networks
, vol.2
, Issue.5
, pp. 427-444
-
-
Chen, H.1
Xiao, Y.2
Hong, X.3
Hu, F.4
Xie, J.L.5
-
3
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
10.1109/TWC.2006.05063
-
Jiang Y, Lin C, Shen X, Shi M (2006) Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications 5(9):2569-2577
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2569-2577
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
6
-
-
41149155794
-
Mobile privacy in wireless networks-revisited
-
10.1109/TWC.2008.060802
-
Tang C, Wu DO (2008) Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications 7(3):1035-1042
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.3
, pp. 1035-1042
-
-
Tang, C.1
Wu, D.O.2
-
7
-
-
56749160373
-
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks
-
March 31-April 2
-
Wan Z G, Ren K, Preneel B. A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. In Proc. The 1st ACM Conference on Wireless Network Security (WiSec 2008), March 31-April 2, 2008, pp.62-67.
-
(2008)
Proc. The 1st ACM Conference on Wireless Network Security (WiSec 2008)
, pp. 62-67
-
-
Wan, Z.G.1
Ren, K.2
Preneel, B.3
-
8
-
-
35449005656
-
Anonymous and authenticated key exchange for roaming networks
-
10.1109/TWC.2007.06020042
-
Yang G, Wong DS, Deng X (2007) Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications 6(9):3461-3472
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.9
, pp. 3461-3472
-
-
Yang, G.1
Wong, D.S.2
Deng, X.3
-
9
-
-
84855586177
-
Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks
-
10.1007/s11277-010-0033-5
-
He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications 61(2):465-472
-
(2011)
Wireless Personal Communications
, vol.61
, Issue.2
, pp. 465-472
-
-
He, D.1
Chan, S.2
Chen, C.3
Bu, J.4
Fan, R.5
-
10
-
-
82755189733
-
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
2865092 1245.94099 10.1016/j.mcm.2011.01.010
-
Li CT, Lee CC (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling 55(1/2):35-44
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.12
, pp. 35-44
-
-
Li, C.T.1
Lee, C.C.2
-
11
-
-
79951676054
-
Privacy-preserving universal authentication protocol for wireless communications
-
10.1109/TWC.2010.120610.101018
-
He D, Bu J, Chan S, Chen C, Yin M (2011) Privacy-preserving universal authentication protocol for wireless communications. IEEE Trans Wireless Communications 10(2):431-436
-
(2011)
IEEE Trans. Wireless Communications
, vol.10
, Issue.2
, pp. 431-436
-
-
He, D.1
Bu, J.2
Chan, S.3
Chen, C.4
Yin, M.5
-
12
-
-
2542616812
-
The quest for personal control over mobile location privacy
-
10.1109/MCOM.2004.1299356
-
He Q, Wu D, Khosla P (2004) The quest for personal control over mobile location privacy. IEEE Communications Magazine 42(5):130-136
-
(2004)
IEEE Communications Magazine
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
14
-
-
79959689122
-
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
-
10.1109/TPDS.2010.206
-
Huang XY, Xiang Y, Chonka A et al (2011) A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Trans Parallel and Distributed Systems 22(8):1390-1397
-
(2011)
IEEE Trans. Parallel and Distributed Systems
, vol.22
, Issue.8
, pp. 1390-1397
-
-
Huang, X.Y.1
Xiang, Y.2
Chonka, A.3
-
15
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
10.1016/j.csi.2008.09.006
-
Xu J, Zhu WT, Feng DG (2009) An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31(4):723-728
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
16
-
-
78751645363
-
Robust authentication and key agreement scheme preserving the privacy of secret key
-
10.1016/j.comcom.2010.04.005
-
Wang RC, Juang WS, Lei CL (2011) Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications 34(3):274-280
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 274-280
-
-
Wang, R.C.1
Juang, W.S.2
Lei, C.L.3
-
17
-
-
0003855464
-
-
2 John Wiley & Sons, Inc. New York
-
Schneier B (1996) Applied Cryptography, 2nd edn. John Wiley & Sons, Inc., New York
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
|