-
1
-
-
0033365053
-
Anonymous channel and authentication in wireless communications
-
10.1016/S0140-3664(99)00108-5
-
Juang, W.; Lei, C.; & Chang, C. (1999). Anonymous channel and authentication in wireless communications. Computer Communications, 22, 1502-1511.
-
(1999)
Computer Communications
, vol.22
, pp. 1502-1511
-
-
Juang, W.1
Lei, C.2
Chang, C.3
-
2
-
-
0036694365
-
Security in wireless communication
-
10.1023/A:1019968506856
-
Rahman, M.; & Imai, H. (2002). Security in wireless communication. Wireless Personal Communications, 22(2), 213-228.
-
(2002)
Wireless Personal Communications
, vol.22
, Issue.2
, pp. 213-228
-
-
Rahman, M.1
Imai, H.2
-
4
-
-
0242335649
-
Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications
-
10.1016/S1389-1286(03)00318-9 1082.68568
-
Barbancho, A.; & Peinado, A. (2003). Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications. Computer Networks, 43, 777-785.
-
(2003)
Computer Networks
, vol.43
, pp. 777-785
-
-
Barbancho, A.1
Peinado, A.2
-
5
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
10.1109/TIE.2006.881998
-
Lee, C.; Hwang, M.; & Liao, I. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683-1687.
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.1
Hwang, M.2
Liao, I.3
-
6
-
-
4544286919
-
Privacy and authentication protocol providing anonymous channels in GSM
-
10.1016/j.comcom.2004.05.018
-
Peinado, A. (2004). Privacy and authentication protocol providing anonymous channels in GSM. Computer Communications, 27, 1709-1715.
-
(2004)
Computer Communications
, vol.27
, pp. 1709-1715
-
-
Peinado, A.1
-
8
-
-
44349104119
-
Protocols for authenticated anonymous communications
-
Fathi, H.; Shin, S.; Kobara, K.; & Imai, H. (2007) Protocols for authenticated anonymous communications. In 18th International symposium on personal, indoor and mobile radio, communications (PIMRC07) (pp. 1-5).
-
(2007)
18th International Symposium on Personal, Indoor and Mobile Radio, Communications (PIMRC07)
, pp. 1-5
-
-
Fathi, H.1
Shin, S.2
Kobara, K.3
Imai, H.4
-
9
-
-
84863310175
-
Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications
-
10.4218/etrij.12.0211.0340
-
He, D. (2012). Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications. ETRI Journal, 34(3), 482-484.
-
(2012)
ETRI Journal
, vol.34
, Issue.3
, pp. 482-484
-
-
He, D.1
-
10
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
10.1109/TCE.2004.1277867 2194290
-
Zhu, J.; & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 231-235.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 231-235
-
-
Zhu, J.1
Ma, J.2
-
12
-
-
80054005779
-
A practical authentication protocol with anonymity for wireless access networks
-
10.1002/wcm.933
-
Chen, Y.; Chuang, S.; Yeh, L.; & Huang, J. (2011). A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing, 11, 1366-1375.
-
(2011)
Wireless Communications and Mobile Computing
, vol.11
, pp. 1366-1375
-
-
Chen, Y.1
Chuang, S.2
Yeh, L.3
Huang, J.4
-
13
-
-
25844519837
-
A secure and efficient authentication protocol for anonymous channel in wireless communications
-
10.1016/j.amc.2004.10.073 1076.94041 2174732
-
Yang, C.; Tang, Y.; Wang, R.; & Yang, H. (2005). A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation, 169(2), 1431-1439.
-
(2005)
Applied Mathematics and Computation
, vol.169
, Issue.2
, pp. 1431-1439
-
-
Yang, C.1
Tang, Y.2
Wang, R.3
Yang, H.4
-
14
-
-
84903511156
-
Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks
-
doi: 10.1002/wcm.2252
-
Hsieh, W.; & Leu, J. (2012). Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks. Wireless Communications and Mobile Computing, doi: 10.1002/wcm.2252.
-
(2012)
Wireless Communications and Mobile Computing
-
-
Hsieh, W.1
Leu, J.2
-
15
-
-
84968503742
-
Elliptic curve cryptosystems
-
10.1090/S0025-5718-1987-0866109-5 0622.94015 866109
-
Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48, 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
16
-
-
0025386404
-
A logic of authentication
-
10.1145/77648.77649
-
Burrows, M.; Abadi, M.; & Needham, R. (1990). A logic of authentication. ACM Transaction on Computer System, 8(1), 18-36.
-
(1990)
ACM Transaction on Computer System
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
17
-
-
84876151110
-
Security flaws in a smart card based authentication scheme for multi-server environment
-
doi: 10.1007/s11277-012-0696-1
-
He, D.; & Wu, S. (2012). Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications, doi: 10.1007/s11277-012-0696-1.
-
(2012)
Wireless Personal Communications
-
-
He, D.1
Wu, S.2
-
18
-
-
84856217617
-
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
-
10.1016/j.jnca.2011.11.009
-
Li, X.; Xiong, Y.; Ma, J.; & Wang, W. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763-769.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.2
, pp. 763-769
-
-
Li, X.1
Xiong, Y.2
Ma, J.3
Wang, W.4
-
19
-
-
84872324933
-
A smart card based efficient and securedmulti-server authentication scheme
-
doi: 10.1007/s11277-011-0456-7
-
Wang, B.; & Ma, M. (2012). A smart card based efficient and securedmulti-server authentication scheme. Wireless Personal Communications, doi: 10.1007/s11277-011-0456-7.
-
(2012)
Wireless Personal Communications
-
-
Wang, B.1
Ma, M.2
-
21
-
-
0036566408
-
Examining smart- card security under the threat of power analysis attacks
-
10.1109/TC.2002.1004593 1901004
-
Messerges, T.; Dabbish, E.; & Sloan, R. (2002). Examining smart- card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
22
-
-
46749099079
-
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
-
10.1016/j.comcom.2007.12.005
-
Li, C.; Hwang, M.; & Chung, Y. (2008). A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communication, 31, 2803-2814.
-
(2008)
Computer Communication
, vol.31
, pp. 2803-2814
-
-
Li, C.1
Hwang, M.2
Chung, Y.3
|