-
1
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
2-s2.0-1942487780 10.1109/TCE.2004.1277867
-
Zhu J.-M., Ma J.-F., A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004 50 1 231 235 2-s2.0-1942487780 10.1109/TCE.2004.1277867
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 231-235
-
-
Zhu, J.-M.1
Ma, J.-F.2
-
2
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
2-s2.0-33750133438 10.1109/TIE.2006.881998
-
Lee C.-C., Hwang M.-S., Liao I.-E., Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006 53 5 1683 1687 2-s2.0-33750133438 10.1109/TIE.2006.881998
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.-C.1
Hwang, M.-S.2
Liao, I.-E.3
-
3
-
-
59649101587
-
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
2-s2.0-59649101587 10.1016/j.comcom.2008.11.032
-
Chang C.-C., Lee C.-Y., Chiu Y.-C., Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 2009 32 4 611 618 2-s2.0-59649101587 10.1016/j.comcom.2008.11.032
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 611-618
-
-
Chang, C.-C.1
Lee, C.-Y.2
Chiu, Y.-C.3
-
4
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
2-s2.0-54949140749 10.1109/LCOMM.2008.080283
-
Wu C.-C., Lee W.-B., Tsaur W.-J., A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters 2008 12 10 722 723 2-s2.0-54949140749 10.1109/LCOMM.2008.080283
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.-C.1
Lee, W.-B.2
Tsaur, W.-J.3
-
5
-
-
78751650071
-
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
-
2-s2.0-78751650071 10.1016/j.comcom.2010.04.041
-
Xu J., Zhu W.-T., Feng D.-G., An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications 2011 34 3 319 325 2-s2.0-78751650071 10.1016/j.comcom.2010.04.041
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 319-325
-
-
Xu, J.1
Zhu, W.-T.2
Feng, D.-G.3
-
6
-
-
68349157387
-
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
-
2-s2.0-68349157387 10.1109/LCOMM.2009.090488
-
Youn T.-Y., Park Y.-H., Lim J., Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters 2009 13 7 471 473 2-s2.0-68349157387 10.1109/LCOMM.2009.090488
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.7
, pp. 471-473
-
-
Youn, T.-Y.1
Park, Y.-H.2
Lim, J.3
-
7
-
-
82755161699
-
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
-
2-s2.0-82755161699 10.1016/j.mcm.2011.04.036
-
Mun H., Han K., Lee Y.-S., Yeun C.-Y., Choi H.-H., Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling 2012 55 1-2 214 222 2-s2.0-82755161699 10.1016/j.mcm.2011.04.036
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.1-2
, pp. 214-222
-
-
Mun, H.1
Han, K.2
Lee, Y.-S.3
Yeun, C.-Y.4
Choi, H.-H.5
-
8
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
2-s2.0-78751648745 10.1016/j.comcom.2010.02.031
-
He D.-J., Ma M.-D., Zhang Y., Chen C., Bu J.-J., A strong user authentication scheme with smart cards for wireless communications. Computer Communications 2011 34 3 367 374 2-s2.0-78751648745 10.1016/j.comcom.2010.02.031
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.-J.1
Ma, M.-D.2
Zhang, Y.3
Chen, C.4
Bu, J.-J.5
-
9
-
-
82755189733
-
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
2-s2.0-82755189733 10.1016/j.mcm.2011.01.010
-
Li C.-T., Lee C.-C., A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling 2012 55 1-2 35 44 2-s2.0-82755189733 10.1016/j.mcm.2011.01.010
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.1-2
, pp. 35-44
-
-
Li, C.-T.1
Lee, C.-C.2
-
10
-
-
84902123902
-
Improvement of user authentication protocol with anonymity for wireless communications
-
Hu B., Xie Q., Bao M. J., Dong N., Improvement of user authentication protocol with anonymity for wireless communications. Kuwait Journal of Science & Engineering 2014 41 1 155 169
-
(2014)
Kuwait Journal of Science & Engineering
, vol.41
, Issue.1
, pp. 155-169
-
-
Hu, B.1
Xie, Q.2
Bao, M.J.3
Dong, N.4
-
11
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
2-s2.0-79952059658 10.1002/dac.1158
-
Chen C., He D., Chan S., Bu J., Gao Y., Fan R., Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011 24 3 347 362 2-s2.0-79952059658 10.1002/dac.1158
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
He, D.2
Chan, S.3
Bu, J.4
Gao, Y.5
Fan, R.6
-
12
-
-
84886081372
-
Secure mobile user authentication and key agreement protocol with privacy protection in global mobility networks
-
July 2013 Chengdu, China
-
Xie Q., Bao M. J., Dong N., Hu B., Wong D.-S., Secure mobile user authentication and key agreement protocol with privacy protection in global mobility networks. Proceedings of the International Symposium on Biometrics and Security Technologies (ISBAST '13) July 2013 Chengdu, China
-
Proceedings of the International Symposium on Biometrics and Security Technologies (ISBAST '13)
-
-
Xie, Q.1
Bao, M.J.2
Dong, N.3
Hu, B.4
Wong, D.-S.5
-
13
-
-
80054005779
-
A practical authentication protocol with anonymity for wireless access networks
-
2-s2.0-80054005779 10.1002/wcm.933
-
Chen Y.-C., Chuang S.-C., Yeh L.-Y., Huang J.-L., A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing 2011 11 10 1366 1375 2-s2.0-80054005779 10.1002/wcm.933
-
(2011)
Wireless Communications and Mobile Computing
, vol.11
, Issue.10
, pp. 1366-1375
-
-
Chen, Y.-C.1
Chuang, S.-C.2
Yeh, L.-Y.3
Huang, J.-L.4
-
14
-
-
84895058980
-
Robust anonymous two-factor authentication scheme for roaming service in global mobility network
-
2-s2.0-84879773864 10.1007/s11277-013-1309-3
-
Xie Q., Hu B., Tan X., Bao M.-J., Yu X.-Y., Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications 2014 74 2 601 614 2-s2.0-84879773864 10.1007/s11277-013-1309-3
-
(2014)
Wireless Personal Communications
, vol.74
, Issue.2
, pp. 601-614
-
-
Xie, Q.1
Hu, B.2
Tan, X.3
Bao, M.-J.4
Yu, X.-Y.5
-
15
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Berlin, Germany Springer Lecture Notes in Computer Science 10.1007/3-540-45539-6-11
-
Bellare M., Pointcheval D., Rogaway P., Authenticated key exchange secure against dictionary attacks. Advances in Cryptology-EUROCRYPT 2000 2000 1807 Berlin, Germany Springer 139 155 Lecture Notes in Computer Science 10.1007/3-540-45539-6-11
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
16
-
-
18744393738
-
Security proofs for an efficient password-based key exchange
-
October 2003 New York, NY, USA 2-s2.0-18744393738
-
Bresson E., Chevassut O., Pointcheval D., Security proofs for an efficient password-based key exchange. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03) October 2003 New York, NY, USA 241 250 2-s2.0-18744393738
-
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)
, pp. 241-250
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
17
-
-
46749099079
-
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
-
2-s2.0-46749099079 10.1016/j.comcom.2007.12.005
-
Li C.-T., Hwang M.-S., Chu Y.-P., A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications 2008 31 12 2803 2814 2-s2.0-46749099079 10.1016/j.comcom.2007.12.005
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2803-2814
-
-
Li, C.-T.1
Hwang, M.-S.2
Chu, Y.-P.3
-
18
-
-
34547877223
-
Secure communications for cluster-based ad hoc networks using node identities
-
2-s2.0-34547877223 10.1016/j.jnca.2006.10.003
-
Lee J.-S., Chang C.-C., Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications 2007 30 4 1377 1396 2-s2.0-34547877223 10.1016/j.jnca.2006.10.003
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.4
, pp. 1377-1396
-
-
Lee, J.-S.1
Chang, C.-C.2
-
19
-
-
82955235553
-
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network
-
2-s2.0-82955235553 10.1016/j.comcom.2011.09.003
-
Li W.-M., Wen Q.-Y., Su Q., Jin Z.-P., An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications 2012 35 2 188 195 2-s2.0-82955235553 10.1016/j.comcom.2011.09.003
-
(2012)
Computer Communications
, vol.35
, Issue.2
, pp. 188-195
-
-
Li, W.-M.1
Wen, Q.-Y.2
Su, Q.3
Jin, Z.-P.4
|