메뉴 건너뛰기




Volumn 74, Issue 2, 2014, Pages 229-243

Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks

Author keywords

Anonymity; Authentication; Elliptic curve Diffie Hellman; Wireless networks

Indexed keywords


EID: 84895056653     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11277-013-1282-x     Document Type: Article
Times cited : (59)

References (22)
  • 1
    • 0033365053 scopus 로고    scopus 로고
    • Anonymous channel and authentication in wireless communications
    • 10.1016/S0140-3664(99)00108-5
    • Juang, W.; Lei, C.; & Chang, C. (1999). Anonymous channel and authentication in wireless communications. Computer Communications, 22, 1502-1511.
    • (1999) Computer Communications , vol.22 , pp. 1502-1511
    • Juang, W.1    Lei, C.2    Chang, C.3
  • 2
    • 0036694365 scopus 로고    scopus 로고
    • Security in wireless communication
    • 10.1023/A:1019968506856
    • Rahman, M.; & Imai, H. (2002). Security in wireless communication. Wireless Personal Communications, 22(2), 213-228.
    • (2002) Wireless Personal Communications , vol.22 , Issue.2 , pp. 213-228
    • Rahman, M.1    Imai, H.2
  • 4
    • 0242335649 scopus 로고    scopus 로고
    • Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications
    • 10.1016/S1389-1286(03)00318-9 1082.68568
    • Barbancho, A.; & Peinado, A. (2003). Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications. Computer Networks, 43, 777-785.
    • (2003) Computer Networks , vol.43 , pp. 777-785
    • Barbancho, A.1    Peinado, A.2
  • 5
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • 10.1109/TIE.2006.881998
    • Lee, C.; Hwang, M.; & Liao, I. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683-1687.
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.1    Hwang, M.2    Liao, I.3
  • 6
    • 4544286919 scopus 로고    scopus 로고
    • Privacy and authentication protocol providing anonymous channels in GSM
    • 10.1016/j.comcom.2004.05.018
    • Peinado, A. (2004). Privacy and authentication protocol providing anonymous channels in GSM. Computer Communications, 27, 1709-1715.
    • (2004) Computer Communications , vol.27 , pp. 1709-1715
    • Peinado, A.1
  • 9
    • 84863310175 scopus 로고    scopus 로고
    • Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications
    • 10.4218/etrij.12.0211.0340
    • He, D. (2012). Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications. ETRI Journal, 34(3), 482-484.
    • (2012) ETRI Journal , vol.34 , Issue.3 , pp. 482-484
    • He, D.1
  • 10
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • 10.1109/TCE.2004.1277867 2194290
    • Zhu, J.; & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 231-235.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 231-235
    • Zhu, J.1    Ma, J.2
  • 12
    • 80054005779 scopus 로고    scopus 로고
    • A practical authentication protocol with anonymity for wireless access networks
    • 10.1002/wcm.933
    • Chen, Y.; Chuang, S.; Yeh, L.; & Huang, J. (2011). A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing, 11, 1366-1375.
    • (2011) Wireless Communications and Mobile Computing , vol.11 , pp. 1366-1375
    • Chen, Y.1    Chuang, S.2    Yeh, L.3    Huang, J.4
  • 13
    • 25844519837 scopus 로고    scopus 로고
    • A secure and efficient authentication protocol for anonymous channel in wireless communications
    • 10.1016/j.amc.2004.10.073 1076.94041 2174732
    • Yang, C.; Tang, Y.; Wang, R.; & Yang, H. (2005). A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation, 169(2), 1431-1439.
    • (2005) Applied Mathematics and Computation , vol.169 , Issue.2 , pp. 1431-1439
    • Yang, C.1    Tang, Y.2    Wang, R.3    Yang, H.4
  • 14
    • 84903511156 scopus 로고    scopus 로고
    • Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks
    • doi: 10.1002/wcm.2252
    • Hsieh, W.; & Leu, J. (2012). Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks. Wireless Communications and Mobile Computing, doi: 10.1002/wcm.2252.
    • (2012) Wireless Communications and Mobile Computing
    • Hsieh, W.1    Leu, J.2
  • 15
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • 10.1090/S0025-5718-1987-0866109-5 0622.94015 866109
    • Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48, 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 17
    • 84876151110 scopus 로고    scopus 로고
    • Security flaws in a smart card based authentication scheme for multi-server environment
    • doi: 10.1007/s11277-012-0696-1
    • He, D.; & Wu, S. (2012). Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications, doi: 10.1007/s11277-012-0696-1.
    • (2012) Wireless Personal Communications
    • He, D.1    Wu, S.2
  • 18
    • 84856217617 scopus 로고    scopus 로고
    • An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
    • 10.1016/j.jnca.2011.11.009
    • Li, X.; Xiong, Y.; Ma, J.; & Wang, W. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763-769.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.2 , pp. 763-769
    • Li, X.1    Xiong, Y.2    Ma, J.3    Wang, W.4
  • 19
    • 84872324933 scopus 로고    scopus 로고
    • A smart card based efficient and securedmulti-server authentication scheme
    • doi: 10.1007/s11277-011-0456-7
    • Wang, B.; & Ma, M. (2012). A smart card based efficient and securedmulti-server authentication scheme. Wireless Personal Communications, doi: 10.1007/s11277-011-0456-7.
    • (2012) Wireless Personal Communications
    • Wang, B.1    Ma, M.2
  • 21
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart- card security under the threat of power analysis attacks
    • 10.1109/TC.2002.1004593 1901004
    • Messerges, T.; Dabbish, E.; & Sloan, R. (2002). Examining smart- card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.1    Dabbish, E.2    Sloan, R.3
  • 22
    • 46749099079 scopus 로고    scopus 로고
    • A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    • 10.1016/j.comcom.2007.12.005
    • Li, C.; Hwang, M.; & Chung, Y. (2008). A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communication, 31, 2803-2814.
    • (2008) Computer Communication , vol.31 , pp. 2803-2814
    • Li, C.1    Hwang, M.2    Chung, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.