메뉴 건너뛰기




Volumn 41, Issue 1, 2014, Pages 155-169

Improvement of user authentication protocol with anonymity for wireless communications

Author keywords

Authentication; Key agreement; Mobile networks; Security; Smart card

Indexed keywords


EID: 84902123902     PISSN: 23074116     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (10)

References (16)
  • 1
    • 59649101587 scopus 로고    scopus 로고
    • Enhanced authentication scheme with anonymity for roaming service in global mobility networks
    • Chang, C. C, Lee, C. Y. & Chiu, Y. C. 2009. Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 32(4): 611-618.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 611-618
    • Chang, C.C.1    Lee, C.Y.2    Chiu, Y.C.3
  • 2
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility network
    • Chen, C, He, D., Chan, S., Bu, J., Gao Y. & Fan, R. 2011. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 24(3): 347-362.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.3 , pp. 347-362
    • Chen, C.1    He, D.2    Chan, S.3    Bu, J.4    Gao, Y.5    Fan, R.6
  • 3
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • He, D., Ma, M., Zhang, Y., Chen, C. & Bu, J. 2011. A strong user authentication scheme with smart cards for wireless communications. Computer Communications 34(3): 367-374.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 367-374
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5
  • 4
    • 84878975055 scopus 로고    scopus 로고
    • An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
    • DOI 10.1007/s11277-012-0535-4
    • Jiang, Q., Ma, J., Li, G. & Yang, L. 2012. An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications. DOI 10.1007/s11277-012-0535-4.
    • (2012) Wireless Personal Communications
    • Jiang, Q.1    Ma, J.2    Li, G.3    Yang, L.4
  • 5
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancementon a new authentication scheme with anonymity for wireless environments
    • Lee, C. C, Hwang, M. S. & Liao, I. E. 2006. Security enhancementon a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron 53(5): 1683-1687.
    • (2006) IEEE Trans. Ind. Electron , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 6
    • 34547877223 scopus 로고    scopus 로고
    • Secure communications for cluster-based adhoc networks using node identities
    • Lee, J. S. & Chang, C. C. 2007. Secure communications for cluster-based adhoc networks using node identities. Journal of Network and Computer Applications. 30 (4): 1377-1396.
    • (2007) Journal of Network and Computer Applications. , vol.30 , Issue.4 , pp. 1377-1396
    • Lee, J.S.1    Chang, C.C.2
  • 7
    • 46749099079 scopus 로고    scopus 로고
    • A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    • Li, C. T., Hwang, M. S. & Chu Y. P. 2008. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications 31(12): 2803-2814.
    • (2008) Computer Communications , vol.31 , Issue.12 , pp. 2803-2814
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 8
    • 82755189733 scopus 로고    scopus 로고
    • A novel user authentication and privacy preserving scheme with smart cards for wireless communications
    • Li, C. T. & Lee, C. C. 2012. A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling 55(1-2): 35-44.
    • (2012) Mathematical and Computer Modelling , vol.55 , Issue.1-2 , pp. 35-44
    • Li, C.T.1    Lee, C.C.2
  • 9
    • 82955235553 scopus 로고    scopus 로고
    • An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network
    • Li, W., Wen, Q., Su, Q. & Jin, Z. 2012. An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications 35(0): 188-195.
    • (2012) Computer Communications , vol.35 , pp. 188-195
    • Li, W.1    Wen, Q.2    Su, Q.3    Jin, Z.4
  • 10
    • 82755161699 scopus 로고    scopus 로고
    • Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
    • Mun, H., Han, K., Lee, Y. S., Yeun, C. Y. & Choi, H. H. 2012. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling 55(1-2): 214-222.
    • (2012) Mathematical and Computer Modelling , vol.55 , Issue.1-2 , pp. 214-222
    • Mun, H.1    Han, K.2    Lee, Y.S.3    Yeun, C.Y.4    Choi, H.H.5
  • 11
    • 84901208308 scopus 로고    scopus 로고
    • Robust smart card based password authentication scheme against smart card loss problem
    • ePrint Archive 439-439
    • Wang, D. & Ma, C. 2012. Robust smart card based password authentication scheme against smart card loss problem. IACR Cryptology ePrint Archive 439-439.
    • (2012) IACR Cryptology
    • Wang, D.1    Ma, C.2
  • 12
    • 84863921959 scopus 로고    scopus 로고
    • Password protected smart card and memory stick authentication against off-line dictionary attacks
    • Gritzalis, D., Furnell, S., M., T. (Eds.). Springer Boston
    • Wang, Y. G. 2012. Password protected smart card and memory stick authentication against off-line dictionary attacks. In: Gritzalis, D., Furnell, S., M., T. (Eds.). Springer Boston. SEC 2012, IFIP AICT, 376: 489-500.
    • (2012) SEC 2012, IFIP AICT , vol.376 , pp. 489-500
    • Wang, Y.G.1
  • 13
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Wu, C. C, Lee, W. B. & Tsaur, W. J. 2008. A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters 12(10): 722-723.
    • (2008) IEEE Communications Letters , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 14
    • 78751650071 scopus 로고    scopus 로고
    • An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    • Xu, J., Zhou, W. T. & Feng, D. G. 2011. An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications 34(3): 319-325.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 319-325
    • Xu, J.1    Zhou, W.T.2    Feng, D.G.3
  • 15
    • 68349157387 scopus 로고    scopus 로고
    • Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
    • Youn, T. Y., Park, Y. H. & Li, M. J. 2009. Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters 13(7): 1118-1123.
    • (2009) IEEE Communications Letters , vol.13 , Issue.7 , pp. 1118-1123
    • Youn, T.Y.1    Park, Y.H.2    Li, M.J.3
  • 16
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu, J. & Ma, J. 2004. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50(1): 230-234.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 230-234
    • Zhu, J.1    Ma, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.