메뉴 건너뛰기




Volumn 23, Issue 5, 2013, Pages 311-324

An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks

Author keywords

[No Author keywords available]

Indexed keywords

ANCILLARY EQUIPMENT; COMMUNICATION MESSAGES; ELLIPTIC CURVE CRYPTOSYSTEM; GLOBAL MOBILITY NETWORK; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; REMOTE USER AUTHENTICATION SCHEMES; USER IMPERSONATION ATTACKS;

EID: 84884135156     PISSN: 10557148     EISSN: 10991190     Source Type: Journal    
DOI: 10.1002/nem.1827     Document Type: Article
Times cited : (15)

References (24)
  • 1
    • 80053053849 scopus 로고    scopus 로고
    • A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks
    • Wu S, Zhu Y, Pu Q,. A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks. International Journal of Network Management 2011; 21 (5): 384-401.
    • (2011) International Journal of Network Management , vol.21 , Issue.5 , pp. 384-401
    • Wu, S.1    Zhu, Y.2    Pu, Q.3
  • 2
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility network
    • Chen C, He D, Chan S, Bu J, Gao Y, Fan R,. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011; 24 (3): 347-362.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.3 , pp. 347-362
    • Chen, C.1    He, D.2    Chan, S.3    Bu, J.4    Gao, Y.5    Fan, R.6
  • 3
    • 79955485356 scopus 로고    scopus 로고
    • User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
    • Gunson N, Marshall D, Morton H, Jack M,. User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. Computers and Security 2011; 30 (4): 208-220.
    • (2011) Computers and Security , vol.30 , Issue.4 , pp. 208-220
    • Gunson, N.1    Marshall, D.2    Morton, H.3    Jack, M.4
  • 4
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L,. Password authentication with insecure communication. Communications of the ACM 1981; 24 (11): 770p-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11
    • Lamport, L.1
  • 6
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • Fan CI, Chan YC, Zhang CK,. Robust remote authentication scheme with smart cards. Computers and Security 2005; 24 (8): 619-628.
    • (2005) Computers and Security , vol.24 , Issue.8 , pp. 619-628
    • Fan, C.I.1    Chan, Y.C.2    Zhang, C.K.3
  • 7
    • 84865219379 scopus 로고    scopus 로고
    • Exploiting hash functions to intensify the remote user authentication scheme
    • Hsieh WB, Leu JS,. Exploiting hash functions to intensify the remote user authentication scheme. Computers and Security 2012; 31 (6): 791-798.
    • (2012) Computers and Security , vol.31 , Issue.6 , pp. 791-798
    • Hsieh, W.B.1    Leu, J.S.2
  • 8
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart cards
    • Yang WH, Shieh SP,. Password authentication schemes with smart cards. Computers and Security 1999; 18 (8): 727-733.
    • (1999) Computers and Security , vol.18 , Issue.8 , pp. 727-733
    • Yang, W.H.1    Shieh, S.P.2
  • 9
    • 80051791613 scopus 로고    scopus 로고
    • Unconstrained keystroke dynamics authentication with shared secret
    • Giot R, El-Abed M, Hemery B, Rosenberger C,. Unconstrained keystroke dynamics authentication with shared secret. Computers and Security 2011; 30 (6-7): 427-445.
    • (2011) Computers and Security , vol.30 , Issue.67 , pp. 427-445
    • Giot, R.1    El-Abed, M.2    Hemery, B.3    Rosenberger, C.4
  • 10
    • 0037030525 scopus 로고    scopus 로고
    • Fingerprint-based remote user authentication scheme using smart cards
    • Lee JK, Ryu SR, Yoo KY,. Fingerprint-based remote user authentication scheme using smart cards. IEEE Electronics Letters 2002; 38 (12): 554-555.
    • (2002) IEEE Electronics Letters , vol.38 , Issue.12 , pp. 554-555
    • Lee, J.K.1    Ryu, S.R.2    Yoo, K.Y.3
  • 11
    • 4043139259 scopus 로고    scopus 로고
    • A flexible biometrics remote user authentication scheme
    • Lin CH, Lai YY,. A flexible biometrics remote user authentication scheme. Computer Standards and Interfaces 2004; 27 (1): 19-23.
    • (2004) Computer Standards and Interfaces , vol.27 , Issue.1 , pp. 19-23
    • Lin, C.H.1    Lai, Y.Y.2
  • 12
    • 33751167604 scopus 로고    scopus 로고
    • Improving the security of a flexible biometrics remote user authentication scheme
    • Khan MK, Zhang J,. Improving the security of a flexible biometrics remote user authentication scheme. Computer Standards and Interfaces 2007; 29 (1): 82-85.
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.1 , pp. 82-85
    • Khan, M.K.1    Zhang, J.2
  • 13
    • 54349125537 scopus 로고    scopus 로고
    • A remote user authentication scheme without using smart cards
    • Rhee HS, Kwon JO, Lee DH,. A remote user authentication scheme without using smart cards. Computers Standards and Interfaces 2009; 31 (1): 6-13.
    • (2009) Computers Standards and Interfaces , vol.31 , Issue.1 , pp. 6-13
    • Rhee, H.S.1    Kwon, J.O.2    Lee, D.H.3
  • 14
    • 63049116480 scopus 로고    scopus 로고
    • An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • Yang JH, Chang CC,. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security 2009; 28 (3-4): 138-143.
    • (2009) Computers and Security , vol.28 , Issue.34 , pp. 138-143
    • Yang, J.H.1    Chang, C.C.2
  • 16
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Koblitz N., Elliptic curve cryptosystem. Mathematics of Computation 1987; 48: 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 21
    • 77649261628 scopus 로고    scopus 로고
    • PhD thesis, Stanford University, 2009 [9 May ]
    • Gentry C,. A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009. Available: http://crypto.stanford.edu/craig [9 May 2013 ].
    • (2013) A Fully Homomorphic Encryption Scheme
    • Gentry, C.1
  • 23
    • 82955235553 scopus 로고    scopus 로고
    • An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network
    • Li W, Wen Q, Su Q, Jin Z,. An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications 2012; 35 (2): 188-195.
    • (2012) Computer Communications , vol.35 , Issue.2 , pp. 188-195
    • Li, W.1    Wen, Q.2    Su, Q.3    Jin, Z.4
  • 24


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.