-
1
-
-
17644390205
-
Efficient authentication protocols of GSM
-
10.1016/j.comcom.2005.01.015
-
Chang, C.; Lee, J.; Chang, Y. (2005). Efficient authentication protocols of GSM. Computer Communications, 28(8), 921-928.
-
(2005)
Computer Communications
, vol.28
, Issue.8
, pp. 921-928
-
-
Chang, C.1
Lee, J.2
Chang, Y.3
-
2
-
-
59649101587
-
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
10.1016/j.comcom.2008.11.032
-
Chang, C.; Lee, C.; Chiu, Y. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(4), 611-618.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 611-618
-
-
Chang, C.1
Lee, C.2
Chiu, Y.3
-
3
-
-
0022145479
-
Security without identification: Trunsactions systems to make big brother obsolete
-
10.1145/4372.4373
-
Chaum, D. (1985). Security without identification: Trunsactions systems to make big brother obsolete. Communications of the ACM, 28(10), 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
4
-
-
84890560968
-
A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications
-
Das, A. (2013). A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Networking Science, 2(1-2), 12-27.
-
(2013)
Networking Science
, vol.2
, Issue.1-2
, pp. 12-27
-
-
Das, A.1
-
6
-
-
77953569983
-
Anonymous roaming in universal mobile telecommunication system mobile networks
-
10.1049/iet-ifs.2009.0154
-
Fatemi, M.; Salimi, S.; Salahi, A. (2010). Anonymous roaming in universal mobile telecommunication system mobile networks. IET Information Security, 4(2), 93-103.
-
(2010)
IET Information Security
, vol.4
, Issue.2
, pp. 93-103
-
-
Fatemi, M.1
Salimi, S.2
Salahi, A.3
-
7
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
10.1016/j.comcom.2010.02.031
-
He, D.; Ma, M.; Zhang, Y.; Chen, C. (2010). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367-374.
-
(2010)
Computer Communications
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
-
8
-
-
84855586177
-
Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks
-
10.1007/s11277-010-0033-5
-
He, D.; Chan, S.; Chen, C.; Bu, J. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61, 465-476.
-
(2011)
Wireless Personal Communications
, vol.61
, pp. 465-476
-
-
He, D.1
Chan, S.2
Chen, C.3
Bu, J.4
-
10
-
-
84878975055
-
An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
-
Jiang, Q.; Ma, J.; Li, G.; Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68, 1477-1491.
-
(2013)
Wireless Personal Communications
, vol.68
, pp. 1477-1491
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Yang, L.4
-
11
-
-
46749113953
-
A new authentication protocol based on pointer forwarding for mobile communications
-
10.1002/wcm.495
-
Lee, C.; Hwang, M.; Liao, I. (2008). A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communication and Mobile Computing, 8(5), 661-672.
-
(2008)
Wireless Communication and Mobile Computing
, vol.8
, Issue.5
, pp. 661-672
-
-
Lee, C.1
Hwang, M.2
Liao, I.3
-
12
-
-
4544330565
-
Extension of authentication protocol for GSM
-
10.1049/ip-com:20030290
-
Lee, C.; Hwang, M.; Yang, W. (2003). Extension of authentication protocol for GSM. IEE Proceedings Communications, 150(2), 91-95.
-
(2003)
IEE Proceedings Communications
, vol.150
, Issue.2
, pp. 91-95
-
-
Lee, C.1
Hwang, M.2
Yang, W.3
-
13
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
10.1109/TIE.2006.881998
-
Lee, C.; Hwang, M.; Liao, I. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683-1686.
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1686
-
-
Lee, C.1
Hwang, M.2
Liao, I.3
-
14
-
-
28544452660
-
Private authentication techniques for the global mobility network
-
10.1007/s11277-005-6177-z
-
Lee, T.; Chang, C.; Hwang, T. (2005). Private authentication techniques for the global mobility network. Wireless Personal Communications, 35(4), 329-336.
-
(2005)
Wireless Personal Communications
, vol.35
, Issue.4
, pp. 329-336
-
-
Lee, T.1
Chang, C.2
Hwang, T.3
-
15
-
-
67649184080
-
Security flaw of authentication scheme with anonymity for wireless communications
-
10.1109/LCOMM.2009.090074
-
Lee, J.; Chang, J.; Lee, D. (2009). Security flaw of authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 13(5), 292-293.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.5
, pp. 292-293
-
-
Lee, J.1
Chang, J.2
Lee, D.3
-
19
-
-
64149102436
-
A robust authentication scheme with user anonymity for wireless environments
-
Wang, R.; Juang, W.; Lei, C. (2009). A robust authentication scheme with user anonymity for wireless environments. International Journal of Innovative Computing, Information and Control, 5(4), 1069-1080. http://grouper.ieee.org/ groups/1363/.
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.4
, pp. 1069-1080
-
-
Wang, R.1
Juang, W.2
Lei, C.3
-
20
-
-
78751645363
-
Robust authentication and key agreement scheme preserving the privacy of secret key
-
Wang, R.; Juang, W.; Lei, C. (2011). Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications, 34(3), 274-280.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 274-280
-
-
Wang, R.1
Juang, W.2
Lei, C.3
-
21
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
10.1109/LCOMM.2008.080283
-
Wu, C.; Lee, B.; Tsaur, W. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722-723.
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.1
Lee, B.2
Tsaur, W.3
-
22
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
Yang, G.; Wong, D.; Wang, H.; Deng, X. (2008). Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences, 74(7), 1160-1172.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.2
Wang, H.3
Deng, X.4
-
23
-
-
35449005656
-
Anonymous and authenticated key exchange for roaming networks
-
Yang, G.; Wong, D.; Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 1035-1042.
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.9
, pp. 1035-1042
-
-
Yang, G.1
Wong, D.2
Deng, X.3
-
24
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
2194290
-
Zhu, J.; Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 51(1), 230-234.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.51
, Issue.1
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
|