메뉴 건너뛰기




Volumn 73, Issue , 2014, Pages 41-57

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

Author keywords

Non tamper resistant; Smart card; Two factor authentication; User anonymity; Wireless sensor networks

Indexed keywords

HASH FUNCTIONS; SMART CARDS; WIRELESS SENSOR NETWORKS;

EID: 84906774949     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2014.07.010     Document Type: Article
Times cited : (187)

References (119)
  • 2
    • 70349690087 scopus 로고    scopus 로고
    • Secure range queries in tiered sensor networks
    • IEEE
    • J. Shi, R. Zhang, and Y. Zhang Secure range queries in tiered sensor networks Proc. INFOCOM 2009 2009 IEEE 945 953
    • (2009) Proc. INFOCOM 2009 , pp. 945-953
    • Shi, J.1    Zhang, R.2    Zhang, Y.3
  • 3
    • 84863455619 scopus 로고    scopus 로고
    • Two-tiered constrained relay node placement in wireless sensor networks: Computational complexity and efficient approximations
    • D. Yang, S. Misra, X. Fang, G. Xue, and J. Zhang Two-tiered constrained relay node placement in wireless sensor networks: computational complexity and efficient approximations IEEE Trans. Mobile Comput. 11 8 2012 1399 1411
    • (2012) IEEE Trans. Mobile Comput. , vol.11 , Issue.8 , pp. 1399-1411
    • Yang, D.1    Misra, S.2    Fang, X.3    Xue, G.4    Zhang, J.5
  • 5
    • 80855130876 scopus 로고    scopus 로고
    • Distributed access control with privacy support in wireless sensor networks
    • D. He, J. Bu, S. Zhu, S. Chan, and C. Chen Distributed access control with privacy support in wireless sensor networks IEEE Trans. Wireless Commun. 10 10 2011 3472 3481
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3472-3481
    • He, D.1    Bu, J.2    Zhu, S.3    Chan, S.4    Chen, C.5
  • 6
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • G.M. Yang, D.S. Wong, H.X. Wang, and X.T. Deng Two-factor mutual authentication based on smart cards and passwords J. Comput. Syst. Sci. 74 7 2008 1160 1172
    • (2008) J. Comput. Syst. Sci. , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.M.1    Wong, D.S.2    Wang, H.X.3    Deng, X.T.4
  • 7
    • 84901199502 scopus 로고    scopus 로고
    • Offline dictionary attack on password authentication schemes using smart cards
    • Y. Desmedt, B. Thuraisingham, K. Hamlen, Springer-Verlag < >
    • D. Wang, and P. Wang Offline dictionary attack on password authentication schemes using smart cards Y. Desmedt, B. Thuraisingham, K. Hamlen, Proc. ISC 2013, LNCS 2014 Springer-Verlag 1 16, < http://eprint.iacr.org/2014/208.pdf >
    • (2014) Proc. ISC 2013, LNCS , pp. 1-16
    • Wang, D.1    Wang, P.2
  • 9
    • 84871983346 scopus 로고    scopus 로고
    • Security implications in kerberos by the introduction of smart cards
    • ACM New York, NY, USA
    • N. Mavrogiannopoulos, A. Pashalidis, and B. Preneel Security implications in kerberos by the introduction of smart cards Proc. ACM ASIACCS 2012 2012 ACM New York, NY, USA 59 63
    • (2012) Proc. ACM ASIACCS 2012 , pp. 59-63
    • Mavrogiannopoulos, N.1    Pashalidis, A.2    Preneel, B.3
  • 10
    • 33947382591 scopus 로고    scopus 로고
    • Cryptography on a speck of dust
    • J.-P. Kaps, G. Gaubatz, and B. Sunar Cryptography on a speck of dust IEEE Comput. 40 2 2007 38 44
    • (2007) IEEE Comput. , vol.40 , Issue.2 , pp. 38-44
    • Kaps, J.-P.1    Gaubatz, G.2    Sunar, B.3
  • 11
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • M.L. Das Two-factor user authentication in wireless sensor networks IEEE Trans. Wireless Commun. 8 3 2009 1086 1090
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 14
    • 84873449020 scopus 로고    scopus 로고
    • Cloud-enabled privacy-preserving collaborative learning for mobile sensing
    • ACM
    • B. Liu, Y. Jiang, F. Sha, and R. Govindan Cloud-enabled privacy-preserving collaborative learning for mobile sensing Proc. Sensys 2012 2012 ACM 57 70
    • (2012) Proc. Sensys 2012 , pp. 57-70
    • Liu, B.1    Jiang, Y.2    Sha, F.3    Govindan, R.4
  • 15
    • 84865738924 scopus 로고    scopus 로고
    • Understanding identity exposure in pervasive computing environments
    • F. Zhu, S. Carpenter, and A. Kulkarni Understanding identity exposure in pervasive computing environments Pervasive Mobile Comput. 8 5 2012 777 794
    • (2012) Pervasive Mobile Comput. , vol.8 , Issue.5 , pp. 777-794
    • Zhu, F.1    Carpenter, S.2    Kulkarni, A.3
  • 16
    • 33748125161 scopus 로고    scopus 로고
    • A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
    • DOI 10.1016/j.cose.2006.05.002, PII S0167404806000769
    • K. Mangipudi, and R. Katti A secure identification and key agreement protocol with user anonymity (SIKA) Comput. Secur. 25 6 2006 420 425 (Pubitemid 44307349)
    • (2006) Computers and Security , vol.25 , Issue.6 , pp. 420-425
    • Mangipudi, K.1    Katti, R.2
  • 17
    • 78751651500 scopus 로고    scopus 로고
    • Sat: A security architecture achieving anonymity and traceability in wireless mesh networks
    • J. Sun, C. Zhang, Y. Zhang, and Y. Fang Sat: a security architecture achieving anonymity and traceability in wireless mesh networks IEEE Trans. Depend. Secur. Comput. 8 2 2011 295 307
    • (2011) IEEE Trans. Depend. Secur. Comput. , vol.8 , Issue.2 , pp. 295-307
    • Sun, J.1    Zhang, C.2    Zhang, Y.3    Fang, Y.4
  • 18
    • 84906756164 scopus 로고    scopus 로고
    • Cpal: A conditional privacy-preserving authentication with access linkability for roaming service
    • C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen Cpal: a conditional privacy-preserving authentication with access linkability for roaming service IEEE Internet Things J. 2014 http://dx.doi.org/10.1109/JIOT.2014.2306673
    • (2014) IEEE Internet Things J.
    • Lai, C.1    Li, H.2    Liang, X.3    Lu, R.4    Zhang, K.5    Shen, X.6
  • 19
    • 0344875575 scopus 로고    scopus 로고
    • Anonymity and privacy: A modular approach
    • D. Hughes, V. Shmatikov, and Information hiding anonymity and privacy: a modular approach J. Comput. Secur. 12 1 2004 3 36
    • (2004) J. Comput. Secur. , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2    Hiding, I.3
  • 20
    • 75449106985 scopus 로고    scopus 로고
    • Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
    • X. Li, W. Qiu, K. Chen, and J. Li Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards IEEE Trans. Ind. Electron. 57 2 2010 793 800
    • (2010) IEEE Trans. Ind. Electron. , vol.57 , Issue.2 , pp. 793-800
    • Li, X.1    Qiu, W.2    Chen, K.3    Li, J.4
  • 21
    • 84887815438 scopus 로고    scopus 로고
    • Cryptanalysis of a remote user authentication scheme with provable security for mobile client-server environment based on ECC
    • D. Wang, and C. Ma Cryptanalysis of a remote user authentication scheme with provable security for mobile client-server environment based on ECC Inform. Fusion 14 4 2013 498 503
    • (2013) Inform. Fusion , vol.14 , Issue.4 , pp. 498-503
    • Wang, D.1    Ma, C.2
  • 22
    • 84884990326 scopus 로고    scopus 로고
    • A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
    • K. Xue, P. Hong, and C. Ma A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture J. Comput. Syst. Sci. 80 1 2014 195 206
    • (2014) J. Comput. Syst. Sci. , vol.80 , Issue.1 , pp. 195-206
    • Xue, K.1    Hong, P.2    Ma, C.3
  • 23
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • D. He, Y. Gao, S. Chan, C. Chen, and J. Bu An enhanced two-factor user authentication scheme in wireless sensor networks Ad Hoc Sensor Wireless Netw. 10 4 2010 361 371
    • (2010) Ad Hoc Sensor Wireless Netw. , vol.10 , Issue.4 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 24
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
    • M. Khan, and K. Alghathbar Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks Sensors 10 3 2010 2450 2459
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.1    Alghathbar, K.2
  • 25
    • 79957718973 scopus 로고    scopus 로고
    • Ruasn: A robust user authentication framework for wireless sensor networks
    • P. Kumar, A.J. Choudhury, M. Sain, S.M. Lee, and H.J. Lee Ruasn: a robust user authentication framework for wireless sensor networks Sensors 11 5 2011 5020 5046
    • (2011) Sensors , vol.11 , Issue.5 , pp. 5020-5046
    • Kumar, P.1    Choudhury, A.J.2    Sain, M.3    Lee, S.M.4    Lee, H.J.5
  • 26
    • 84872473654 scopus 로고    scopus 로고
    • Security enhancement of robust user authentication framework for wireless sensor networks
    • Q. Jiang, Z. Ma, J.F. Ma, and G. Li Security enhancement of robust user authentication framework for wireless sensor networks China Commun. 9 10 2012 103 111
    • (2012) China Commun. , vol.9 , Issue.10 , pp. 103-111
    • Jiang, Q.1    Ma, Z.2    Ma, J.F.3    Li, G.4
  • 27
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • K. Xue, C. Ma, P. Hong, and R. Ding A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks J. Network Comput. Appl. 36 1 2013 316 323
    • (2013) J. Network Comput. Appl. , vol.36 , Issue.1 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3    Ding, R.4
  • 28
    • 84887125774 scopus 로고    scopus 로고
    • SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
    • C. Lai, H. Li, R. Lu, and X.S. Shen SE-AKA: a secure and efficient group authentication and key agreement protocol for LTE networks Comput. Networks 57 17 2013 3492 3510
    • (2013) Comput. Networks , vol.57 , Issue.17 , pp. 3492-3510
    • Lai, C.1    Li, H.2    Lu, R.3    Shen, X.S.4
  • 29
    • 84862773089 scopus 로고    scopus 로고
    • Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
    • D. Nyang, M. Lee, Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks, Cryptology ePrint Archive, Report 2009/631, 2009. < http://eprint.iacr.org/2009/631.pdf >.
    • (2009) Cryptology EPrint Archive, Report 2009/631
    • Nyang, D.1    Lee, M.2
  • 30
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • T. Chen, and W. Shih A robust mutual authentication protocol for wireless sensor networks ETRI J. 32 5 2010 704 712
    • (2010) ETRI J. , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.1    Shih, W.2
  • 31
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • H. Yeh, T. Chen, P. Liu, T. Kim, and H. Wei A secured authentication protocol for wireless sensor networks using elliptic curves cryptography Sensors 11 5 2011 4767 4779
    • (2011) Sensors , vol.11 , Issue.5 , pp. 4767-4779
    • Yeh, H.1    Chen, T.2    Liu, P.3    Kim, T.4    Wei, H.5
  • 32
    • 84883446358 scopus 로고    scopus 로고
    • On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    • D. Sun, J. Li, Z. Feng, Z. Cao, and G. Xu On the security and improvement of a two-factor user authentication scheme in wireless sensor networks Pers. Ubiquitous Comput. 17 5 2013 895 905
    • (2013) Pers. Ubiquitous Comput. , vol.17 , Issue.5 , pp. 895-905
    • Sun, D.1    Li, J.2    Feng, Z.3    Cao, Z.4    Xu, G.5
  • 33
    • 84862762845 scopus 로고    scopus 로고
    • A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • A.K. Das, P. Sharma, S. Chatterjee, and J.K. Sing A dynamic password-based user authentication scheme for hierarchical wireless sensor networks J. Network Comput. Appl. 35 52 2012 1646 1656
    • (2012) J. Network Comput. Appl. , vol.35 , Issue.52 , pp. 1646-1656
    • Das, A.K.1    Sharma, P.2    Chatterjee, S.3    Sing, J.K.4
  • 34
    • 84901234489 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication in wireless sensor networks
    • J.-J. Yuan An enhanced two-factor user authentication in wireless sensor networks Telecommun. Syst. 55 1 2014 105 113
    • (2014) Telecommun. Syst. , vol.55 , Issue.1 , pp. 105-113
    • Yuan, J.-J.1
  • 35
    • 84961312004 scopus 로고    scopus 로고
    • Two-factor mutual authentication with key agreement in wireless sensor networks
    • B. Vaidya, D. Makrakis, and H. Mouftah Two-factor mutual authentication with key agreement in wireless sensor networks Secur. Commun. Netw. 2012 http://dx.doi.org/10.1002/sec.517
    • (2012) Secur. Commun. Netw.
    • Vaidya, B.1    Makrakis, D.2    Mouftah, H.3
  • 36
    • 79960062320 scopus 로고    scopus 로고
    • An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks
    • R. Fan, D. He, X. Pan, and L. Ping An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks J. Zhejinag Univ.-Sci C 12 7 2011 550 560
    • (2011) J. Zhejinag Univ.-Sci C , vol.12 , Issue.7 , pp. 550-560
    • Fan, R.1    He, D.2    Pan, X.3    Ping, L.4
  • 37
    • 84879297926 scopus 로고    scopus 로고
    • An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • M. Turkanovic, and M. Holbl An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks Electron. Electr. Eng. 19 6 2013 109 116
    • (2013) Electron. Electr. Eng. , vol.19 , Issue.6 , pp. 109-116
    • Turkanovic, M.1    Holbl, M.2
  • 38
    • 84883237067 scopus 로고    scopus 로고
    • Towards secure and dynamic password based user authentication scheme in hierarchical wireless sensor networks
    • C.-T. Li, C.-Y. Weng, C.-C. Lee, and C.-W. Lee Towards secure and dynamic password based user authentication scheme in hierarchical wireless sensor networks Int. J. Secur. Appl. 7 3 2013 249 258
    • (2013) Int. J. Secur. Appl. , vol.7 , Issue.3 , pp. 249-258
    • Li, C.-T.1    Weng, C.-Y.2    Lee, C.-C.3    Lee, C.-W.4
  • 39
    • 79959299654 scopus 로고    scopus 로고
    • On the (im) possibility of perennial message recognition protocols without public-key cryptography
    • ACM
    • M. González Muñiz, and P. Laud On the (im) possibility of perennial message recognition protocols without public-key cryptography Proc. ACM SAC 2011 2011 ACM 1510 1515
    • (2011) Proc. ACM SAC 2011 , pp. 1510-1515
    • González Muñiz, M.1    Laud, P.2
  • 40
    • 84957690790 scopus 로고    scopus 로고
    • Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
    • Advances in Cryptology - EUROCRYPT '98
    • D. Simon Finding collisions on a one-way street: can secure hash functions be based on general assumptions? K. Nyberg, Proc. EUROCRYPT 1998, LNCS vol. 1403 1998 Springer Verlag 334 345 (Pubitemid 128081496)
    • (1998) Lecture Notes In Computer Science , Issue.1403 , pp. 334-345
    • Simon, D.R.1
  • 41
    • 33646036428 scopus 로고    scopus 로고
    • Limits of the cryptographic realization of dolev-yao-style xor
    • S. Vimercati, P. Syverson, D. Gollmann, Springer Berlin Heidelberg
    • M. Backes, and B. Pfitzmann Limits of the cryptographic realization of dolev-yao-style xor S. Vimercati, P. Syverson, D. Gollmann, Proc. ESORICS 2005, LNCS vol. 3679 2005 Springer Berlin Heidelberg 178 196
    • (2005) Proc. ESORICS 2005, LNCS , vol.3679 , pp. 178-196
    • Backes, M.1    Pfitzmann, B.2
  • 42
    • 38149038590 scopus 로고    scopus 로고
    • Does secure time-stamping imply collision-free hash functions?
    • W. Susilo, J. Liu, Y. Mu, Springer Berlin Heidelberg
    • A. Buldas, and A. Jrgenson Does secure time-stamping imply collision-free hash functions? W. Susilo, J. Liu, Y. Mu, Proc. ProvSec 2007, LNCS vol. 4784 2007 Springer Berlin Heidelberg 138 150
    • (2007) Proc. ProvSec 2007, LNCS , vol.4784 , pp. 138-150
    • Buldas, A.1    Jrgenson, A.2
  • 44
    • 71849087704 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • S. Halevi, and H. Krawczyk Public-key cryptography and password protocols ACM Trans. Inf. Syst. Secur. 2 3 1999 230 268
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.3 , pp. 230-268
    • Halevi, S.1    Krawczyk, H.2
  • 45
    • 84957794888 scopus 로고    scopus 로고
    • Forward secrecy and its application to future mobile communications security
    • H. Imai, Y. Zheng, Springer Berlin/ Heidelberg
    • D. Park, C. Boyd, and S.-J. Moon Forward secrecy and its application to future mobile communications security H. Imai, Y. Zheng, Proc. PKC 2000, LNCS vol. 1751 2000 Springer Berlin/ Heidelberg 433 445
    • (2000) Proc. PKC 2000, LNCS , vol.1751 , pp. 433-445
    • Park, D.1    Boyd, C.2    Moon, S.-J.3
  • 46
    • 24144502325 scopus 로고    scopus 로고
    • The relationship between password-authenticated key exchange and other cryptographic primitives
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • M.-H. Nguyen The relationship between password-authenticated key exchange and other cryptographic primitives J. Kilian, Proc. TCC 2006, LNCS vol. 3378 2005 Springer Verlag 457 475 (Pubitemid 41231178)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 457-475
    • Nguyen, M.-H.1
  • 47
    • 63649131787 scopus 로고    scopus 로고
    • On the anonymity of some authentication schemes for wireless communications
    • P. Zeng, Z. Cao, K.-k. Choo, and S. Wang On the anonymity of some authentication schemes for wireless communications IEEE Commun. Lett. 13 3 2009 170 171
    • (2009) IEEE Commun. Lett. , vol.13 , Issue.3 , pp. 170-171
    • Zeng, P.1    Cao, Z.2    Choo, K.-K.3    Wang, S.4
  • 48
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • J. Zhu, and J. Ma A new authentication scheme with anonymity for wireless environments IEEE Trans. Consum. Electron. 50 1 2004 231 235
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.1 , pp. 231-235
    • Zhu, J.1    Ma, J.2
  • 49
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • DOI 10.1109/TIE.2006.881998
    • C.-C. Lee, M.-S. Hwang, and I.-E. Liao Security enhancement on a new authentication scheme with anonymity for wireless environments IEEE Trans. Ind. Electron. 53 5 2006 1683 1687 (Pubitemid 44593519)
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.-C.1    Hwang, M.-S.2    Liao, I.-E.3
  • 50
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • C.-C. Wu, W.-B. Lee, and W.-J. Tsaur A secure authentication scheme with anonymity for wireless communications IEEE Commun. Lett. 12 10 2008 722 723
    • (2008) IEEE Commun. Lett. , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.-C.1    Lee, W.-B.2    Tsaur, W.-J.3
  • 51
    • 84880828581 scopus 로고    scopus 로고
    • An advanced temporal credential-based security scheme with mutual authentication and key agreement for WSNs
    • C.-T. Li, C.-Y. Weng, and C.-C. Lee An advanced temporal credential-based security scheme with mutual authentication and key agreement for WSNs Sensors 13 8 2013 9589 9603
    • (2013) Sensors , vol.13 , Issue.8 , pp. 9589-9603
    • Li, C.-T.1    Weng, C.-Y.2    Lee, C.-C.3
  • 52
    • 84863271667 scopus 로고    scopus 로고
    • E-sap: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
    • P. Kumar, S.-G. Lee, and H.-J. Lee E-sap: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks Sensors 12 2 2012 1625 1647
    • (2012) Sensors , vol.12 , Issue.2 , pp. 1625-1647
    • Kumar, P.1    Lee, S.-G.2    Lee, H.-J.3
  • 53
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart-card security under the threat of power analysis attacks IEEE Trans. Comput. 51 5 2002 541 552 (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 55
    • 84867337073 scopus 로고    scopus 로고
    • Side channel analysis attacks using am demodulation on commercial smart cards with seed
    • T.H. Kim, C. Kim, and I. Park Side channel analysis attacks using am demodulation on commercial smart cards with seed J. Syst. Soft. 85 12 2012 2899 2908
    • (2012) J. Syst. Soft. , vol.85 , Issue.12 , pp. 2899-2908
    • Kim, T.H.1    Kim, C.2    Park, I.3
  • 57
    • 84893081352 scopus 로고    scopus 로고
    • Reverse-engineering a cryptographic rfid tag
    • (USENIX Security 2008), USENIX Association
    • K. Nohl, D. Evans, S. Starbug, H. Plötz, Reverse-engineering a cryptographic rfid tag, in: Proc. 17th USENIX Security Symp. (USENIX Security 2008), USENIX Association, 2008, pp. 185-193.
    • (2008) Proc. 17th USENIX Security Symp , pp. 185-193
    • Nohl, K.1
  • 58
    • 84894522439 scopus 로고    scopus 로고
    • Efficient and secure dynamic id-based remote user authentication scheme for distributed systems using smart cards
    • J.-S. Leu, and W.-B. Hsieh Efficient and secure dynamic id-based remote user authentication scheme for distributed systems using smart cards IET Inf. Secur. 8 2 2014 104 113
    • (2014) IET Inf. Secur. , vol.8 , Issue.2 , pp. 104-113
    • Leu, J.-S.1    Hsieh, W.-B.2
  • 59
    • 84881573841 scopus 로고    scopus 로고
    • An efficient authentication protocol with user anonymity for mobile networks
    • IEEE
    • H. Li, Y. Yang, and L. Pang An efficient authentication protocol with user anonymity for mobile networks Proc. WCNC 2013 2013 IEEE 1842 1847
    • (2013) Proc. WCNC 2013 , pp. 1842-1847
    • Li, H.1    Yang, Y.2    Pang, L.3
  • 60
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • D. He, M. Ma, Y. Zhang, C. Chen, and J. Bu A strong user authentication scheme with smart cards for wireless communications Comput. Commun. 34 3 2011 367 374
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 367-374
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5
  • 61
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility network
    • C. Chen, D. He, S. Chan, J. Bu, and R. Fan Lightweight and provably secure user authentication with anonymity for the global mobility network Int. J. Commun. Syst. 24 3 2011 347 362
    • (2011) Int. J. Commun. Syst. , vol.24 , Issue.3 , pp. 347-362
    • Chen, C.1    He, D.2    Chan, S.3    Bu, J.4    Fan, R.5
  • 62
    • 84856217617 scopus 로고    scopus 로고
    • An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards
    • X. Li, Y. Xiong, J. Ma, and W. Wang An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards J. Network Comput. Appl. 35 2 2012 763 769
    • (2012) J. Network Comput. Appl. , vol.35 , Issue.2 , pp. 763-769
    • Li, X.1    Xiong, Y.2    Ma, J.3    Wang, W.4
  • 63
    • 84858082073 scopus 로고    scopus 로고
    • An improved dynamic id-based remote user authentication with key agreement scheme
    • F. Wen, and X. Li An improved dynamic id-based remote user authentication with key agreement scheme Comput. Electri. Eng. 38 2 2012 381 387
    • (2012) Comput. Electri. Eng. , vol.38 , Issue.2 , pp. 381-387
    • Wen, F.1    Li, X.2
  • 64
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme'
    • M. Khan, and S. Kim Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme' Comput. Commun. 34 3 2011 305 309
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.1    Kim, S.2
  • 65
    • 84901188390 scopus 로고    scopus 로고
    • A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
    • M. Turkanović, B. Brumen, and M. Hölbl A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion Ad Hoc Networks 20 2014 96 112
    • (2014) Ad Hoc Networks , vol.20 , pp. 96-112
    • Turkanović, M.1    Brumen, B.2    Hölbl, M.3
  • 66
    • 84911988873 scopus 로고    scopus 로고
    • An authentication and key agreement protocol for satellite communications
    • C.-C. Chang, T.-F. Cheng, and H.-L. Wu An authentication and key agreement protocol for satellite communications Int. J. Commun. Syst. 2013 http://dx.doi.org/10.1002/dac.2448
    • (2013) Int. J. Commun. Syst.
    • Chang, C.-C.1    Cheng, T.-F.2    Wu, H.-L.3
  • 67
    • 84931577706 scopus 로고    scopus 로고
    • An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
    • S. Shin, H. Yeh, and K. Kim An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks Peer-to-Peer Network Appl. 2013 http://dx.doi.org/10.1007/s12083-013-0218-2
    • (2013) Peer-to-Peer Network Appl.
    • Shin, S.1    Yeh, H.2    Kim, K.3
  • 68
    • 84957019437 scopus 로고    scopus 로고
    • Privacy Protection for Transactions of Digital Goods
    • Information and Communications Security
    • F. Bao, and R. Deng Privacy protection for transactions of digital goods S. Qing, T. Okamoto, J. Zhou, Proc. ICICS 2001, LNCS vol. 2229 2001 Springer-Verlag 202 213 (Pubitemid 33361969)
    • (2001) Lecture Notes In Computer Science , Issue.2229 , pp. 202-213
    • Bao, F.1    Deng, R.2
  • 69
    • 4043122631 scopus 로고    scopus 로고
    • A dynamic id-based remote user authentication scheme
    • M.L. Das, A. Saxena, and V.P. Gulati A dynamic id-based remote user authentication scheme IEEE Trans. Consum. Electron. 50 2 2004 629 631
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.2 , pp. 629-631
    • Das, M.L.1    Saxena, A.2    Gulati, V.P.3
  • 70
    • 54449094667 scopus 로고    scopus 로고
    • A secure dynamic id based remote user authentication scheme for multi-server environment
    • Y.-P. Liao, and S.-S. Wang A secure dynamic id based remote user authentication scheme for multi-server environment Comput. Stand. & Inter. 31 1 2009 24 29
    • (2009) Comput. Stand. & Inter. , vol.31 , Issue.1 , pp. 24-29
    • Liao, Y.-P.1    Wang, S.-S.2
  • 71
    • 84901198272 scopus 로고    scopus 로고
    • Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
    • D. Wang, and P. Wang Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks Ad Hoc Networks 20 2014 1 15
    • (2014) Ad Hoc Networks , vol.20 , pp. 1-15
    • Wang, D.1    Wang, P.2
  • 72
    • 84863921959 scopus 로고    scopus 로고
    • Password protected smart card and memory stick authentication against off-line dictionary attacks
    • Springer Boston
    • Y.G. Wang Password protected smart card and memory stick authentication against off-line dictionary attacks Proc. SEC 2012, IFIP AICT vol. 376 2012 Springer Boston 489 500
    • (2012) Proc. SEC 2012, IFIP AICT , vol.376 , pp. 489-500
    • Wang, Y.G.1
  • 73
    • 77951127884 scopus 로고    scopus 로고
    • A collusion-resistant routing scheme for noncooperative wireless ad hoc networks
    • S. Zhong, and F. Wu A collusion-resistant routing scheme for noncooperative wireless ad hoc networks IEEE/ACM Trans. Network 18 2 2010 582 595
    • (2010) IEEE/ACM Trans. Network , vol.18 , Issue.2 , pp. 582-595
    • Zhong, S.1    Wu, F.2
  • 74
    • 84876041353 scopus 로고    scopus 로고
    • Robust localization against outliers in wireless sensor networks
    • Q. Xiao, K. Bu, Z. Wang, and B. Xiao Robust localization against outliers in wireless sensor networks ACM Trans. Sensor Network 9 2 2013 24
    • (2013) ACM Trans. Sensor Network , vol.9 , Issue.2 , pp. 24
    • Xiao, Q.1    Bu, K.2    Wang, Z.3    Xiao, B.4
  • 75
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev, and A. Yao On the security of public key protocols IEEE Trans. Inform. Theory 29 2 1983 198 208
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 78
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: Analyzing an anonymized corpus of 70 million passwords
    • J. Bonneau, The science of guessing: analyzing an anonymized corpus of 70 million passwords, in: Proc. IEEE S&P 2012, IEEE Computer Society, 2012, pp. 538-552.
    • (2012) Proc. IEEE S&P 2012, IEEE Computer Society , pp. 538-552
    • Bonneau, J.1
  • 80
    • 78751641225 scopus 로고    scopus 로고
    • On the security of chien's ultralightweight RFID authentication protocol
    • H.-M. Sun, W.-C. Ting, and K.-H. Wang On the security of chien's ultralightweight RFID authentication protocol IEEE Trans. Depend. Secur. Comput. 8 2 2011 315 317
    • (2011) IEEE Trans. Depend. Secur. Comput. , vol.8 , Issue.2 , pp. 315-317
    • Sun, H.-M.1    Ting, W.-C.2    Wang, K.-H.3
  • 81
    • 84863392461 scopus 로고    scopus 로고
    • On the security of a ticket-based anonymity system with traceability property in wireless mesh networks
    • H. Wang, and Y. Zhang On the security of a ticket-based anonymity system with traceability property in wireless mesh networks IEEE Trans. Depend. Secur. Comput. 9 3 2012 443 446
    • (2012) IEEE Trans. Depend. Secur. Comput. , vol.9 , Issue.3 , pp. 443-446
    • Wang, H.1    Zhang, Y.2
  • 82
    • 84871821096 scopus 로고    scopus 로고
    • Security analysis of a single sign-on mechanism for distributed computer networks
    • G. Wang, J. Yu, and Q. Xie Security analysis of a single sign-on mechanism for distributed computer networks IEEE Trans. Ind. Inform. 9 1 2013 294 302
    • (2013) IEEE Trans. Ind. Inform. , vol.9 , Issue.1 , pp. 294-302
    • Wang, G.1    Yu, J.2    Xie, Q.3
  • 83
    • 84906756166 scopus 로고    scopus 로고
    • IPass: Robust smart card based password authentication scheme against smart card loss problem
    • (in press)
    • D. Wang, P. Wang, C.G. Ma, Z. Chen, iPass: robust smart card based password authentication scheme against smart card loss problem, J. Comput. Syst. Sci., (2014) (in press). < http://eprint.iacr.org/2012/439.pdf >.
    • (2014) J. Comput. Syst. Sci.
    • Wang, D.1    Wang, P.2    Ma, C.G.3    Chen, Z.4
  • 84
    • 84868014129 scopus 로고    scopus 로고
    • A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography
    • M. Khan, and D. He A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography Secur. Commun. Netw. 5 11 2012 1260 1266
    • (2012) Secur. Commun. Netw. , vol.5 , Issue.11 , pp. 1260-1266
    • Khan, M.1    He, D.2
  • 85
    • 84911988880 scopus 로고    scopus 로고
    • Security flaws in two improved remote user authentication schemes using smart cards
    • C. Ma, D. Wang, and S.D. Zhao Security flaws in two improved remote user authentication schemes using smart cards Int. J. Commun. Syst. 2012 http://dx.doi.org/10.1002/dac.2468
    • (2012) Int. J. Commun. Syst.
    • Ma, C.1    Wang, D.2    Zhao, S.D.3
  • 86
    • 84906738412 scopus 로고    scopus 로고
    • Improved privacy-preserving authentication scheme for roaming service in mobile networks
    • D. Wang, P. Wang, J. Liu, Improved privacy-preserving authentication scheme for roaming service in mobile networks, in: Proc. WCNC 2014, 2014, pp. 3178-3183.
    • (2014) Proc. WCNC 2014 , pp. 3178-3183
    • Wang, D.1    Wang, P.2    Liu, J.3
  • 87
    • 84871579251 scopus 로고    scopus 로고
    • Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture
    • L. Xu, Y. Mu, Springer Berlin/Heidelberg
    • D. Wang, C.G. Ma, D.L. Gu, and Z.S. Cui Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture L. Xu, Y. Mu, Proc. NSS 2012, LNCS vol. 7645 2012 Springer Berlin/Heidelberg 462 475
    • (2012) Proc. NSS 2012, LNCS , vol.7645 , pp. 462-475
    • Wang, D.1    Ma, C.G.2    Gu, D.L.3    Cui, Z.S.4
  • 88
    • 84885231928 scopus 로고    scopus 로고
    • A strong authentication scheme with user privacy for wireless sensor networks.
    • P. Kumar, A. Gurtov, M. Ylianttila, S.-G. Lee, and H. Lee A strong authentication scheme with user privacy for wireless sensor networks. ETRI J. 35 5 2013 889 899
    • (2013) ETRI J. , vol.35 , Issue.5 , pp. 889-899
    • Kumar, P.1    Gurtov, A.2    Ylianttila, M.3    Lee, S.-G.4    Lee, H.5
  • 89
    • 84879448131 scopus 로고    scopus 로고
    • Security analysis and improvement of a privacy authentication scheme for telecare medical information systems
    • F. Wu, and L. Xu Security analysis and improvement of a privacy authentication scheme for telecare medical information systems J. Med. Syst. 2014 http://dx.doi.org/10.1007/s10916-013-9958-z
    • (2014) J. Med. Syst.
    • Wu, F.1    Xu, L.2
  • 90
    • 84893037497 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an efficient and secure dynamic id-based authentication scheme for telecare medical information systems
    • M.K. Khan, and S. Kumari Cryptanalysis and improvement of an efficient and secure dynamic id-based authentication scheme for telecare medical information systems Secur. Commun. Networks 2013 http://dx.doi.org/10.1002/sec. 791
    • (2013) Secur. Commun. Networks
    • Khan, M.K.1    Kumari, S.2
  • 91
    • 84874650547 scopus 로고    scopus 로고
    • Spam: A secure password authentication mechanism for seamless handover in proxy mobile ipv6 networks
    • M.-C. Chuang, J.-F. Lee, and M.-C. Chen Spam: A secure password authentication mechanism for seamless handover in proxy mobile ipv6 networks IEEE Syst. J. 7 1 2013 102 113
    • (2013) IEEE Syst. J. , vol.7 , Issue.1 , pp. 102-113
    • Chuang, M.-C.1    Lee, J.-F.2    Chen, M.-C.3
  • 92
    • 71449093776 scopus 로고    scopus 로고
    • Efficient and secure authenticated key exchange using weak passwords
    • J. Katz, R. Ostrovsky, and M. Yung Efficient and secure authenticated key exchange using weak passwords J. ACM 57 1 2009 1 39
    • (2009) J. ACM , vol.57 , Issue.1 , pp. 1-39
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 93
    • 84995943281 scopus 로고    scopus 로고
    • On the Security of Some Smart-Card-Based Remote User Authentication Schemes for wsn
    • D. Wang, C.G. Ma, On the Security of Some Smart-Card-Based Remote User Authentication Schemes for wsn, Cryptology ePrint Archive, Report 2012/581, 2012. < http://eprint.iacr.org/2012/581.pdf >.
    • (2012) Cryptology EPrint Archive, Report 2012/581
    • Wang, D.1    Ma, C.G.2
  • 94
    • 84890555385 scopus 로고    scopus 로고
    • A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
    • F. Wen, W. Susilo, and G. Yang A secure and effective anonymous user authentication scheme for roaming service in global mobility networks Wireless Pers. Commun. 2013 http://dx.doi.org/10.1007/s11277-013-1243-4
    • (2013) Wireless Pers. Commun.
    • Wen, F.1    Susilo, W.2    Yang, G.3
  • 95
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment
    • H.-C. Hsiang, and W.-K. Shih Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment Comput. Stand. Interfaces 31 6 2009 1118 1123
    • (2009) Comput. Stand. Interfaces , vol.31 , Issue.6 , pp. 1118-1123
    • Hsiang, H.-C.1    Shih, W.-K.2
  • 96
    • 79951480285 scopus 로고    scopus 로고
    • Improved user authentication scheme with user anonymity for wireless communications
    • M. Kang, S. Rhee, and Y. Choi Improved user authentication scheme with user anonymity for wireless communications IEICE Trans. Fund. Electron. Commun. Comput. Sci. 94 2 2011 860 864
    • (2011) IEICE Trans. Fund. Electron. Commun. Comput. Sci. , vol.94 , Issue.2 , pp. 860-864
    • Kang, M.1    Rhee, S.2    Choi, Y.3
  • 97
    • 84878597719 scopus 로고    scopus 로고
    • A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
    • X. Li, J. Ma, W. Wang, and J. Zhang A novel smart card and dynamic id based remote user authentication scheme for multi-server environments Math. Comput. Model. 58 2 2013 85 95
    • (2013) Math. Comput. Model. , vol.58 , Issue.2 , pp. 85-95
    • Li, X.1    Ma, J.2    Wang, W.3    Zhang, J.4
  • 98
    • 84898648439 scopus 로고    scopus 로고
    • Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks
    • J. Kim, D. Lee, W. Jeon, Y. Lee, and D. Won Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks Sensors 14 4 2014 6443 6462
    • (2014) Sensors , vol.14 , Issue.4 , pp. 6443-6462
    • Kim, J.1    Lee, D.2    Jeon, W.3    Lee, Y.4    Won, D.5
  • 99
    • 84906050570 scopus 로고    scopus 로고
    • An improved remote user authentication scheme with key agreement
    • S. Kumari, M.K. Khan, and X. Li An improved remote user authentication scheme with key agreement Comput. Electrical Eng. 2014 http://dx.doi.org/10. 1016/j.compeleceng.2014.05.007
    • (2014) Comput. Electrical Eng.
    • Kumari, S.1    Khan, M.K.2    Li, X.3
  • 100
    • 84901208306 scopus 로고    scopus 로고
    • Smart card security from a programming language and static analysis perspective
    • X. Leroy, Smart card security from a programming language and static analysis perspective, INRIA Rocquencourt & Trusted Logic, Tecnical Report, 2013. < http://pauillac.inria.fr/xleroy/talks/language-security-etaps03.pdf >.
    • (2013) INRIA Rocquencourt & Trusted Logic, Tecnical Report
    • Leroy, X.1
  • 101
    • 67649386419 scopus 로고    scopus 로고
    • Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards
    • D. Sun, J. Huai, J. Sun, J. Li, J. Zhang, and Z. Feng Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards IEEE Trans. Ind. Electron. 56 6 2009 2284 2291
    • (2009) IEEE Trans. Ind. Electron. , vol.56 , Issue.6 , pp. 2284-2291
    • Sun, D.1    Huai, J.2    Sun, J.3    Li, J.4    Zhang, J.5    Feng, Z.6
  • 102
    • 78651364381 scopus 로고    scopus 로고
    • Provable secure authentication protocol with anonymity for roaming service in global mobility networks
    • T. Zhou, and J. Xu Provable secure authentication protocol with anonymity for roaming service in global mobility networks Comput. Network 55 1 2011 205 213
    • (2011) Comput. Network , vol.55 , Issue.1 , pp. 205-213
    • Zhou, T.1    Xu, J.2
  • 103
    • 84873910697 scopus 로고    scopus 로고
    • Security and efficiency in roaming services for wireless networks: Challenges, approaches, and prospects
    • D. He, C. Chen, J. Bu, S. Chan, and Y. Zhang Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects IEEE Commun. Mag. 51 2 2013 142 150
    • (2013) IEEE Commun. Mag. , vol.51 , Issue.2 , pp. 142-150
    • He, D.1    Chen, C.2    Bu, J.3    Chan, S.4    Zhang, Y.5
  • 104
    • 84856471625 scopus 로고    scopus 로고
    • Secure and efficient handover authentication based on bilinear pairing functions
    • D. He, C. Chen, S. Chan, and J. Bu Secure and efficient handover authentication based on bilinear pairing functions IEEE Trans. Wireless Commun. 11 1 2012 48 53
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.1 , pp. 48-53
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 105
    • 85024290278 scopus 로고
    • Group signatures
    • D. Davies, Springer Verlag
    • D. Chaum, and E. Heyst Group signatures D. Davies, Proc. EUROCRYPT 1991, LNCS vol. 547 1991 Springer Verlag 257 265
    • (1991) Proc. EUROCRYPT 1991, LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    Heyst, E.2
  • 106
    • 84875591362 scopus 로고    scopus 로고
    • An efficient threshold anonymous authentication scheme for privacy-preserving communications
    • J. Ren, and L. Harn An efficient threshold anonymous authentication scheme for privacy-preserving communications IEEE Trans. Wireless Commun. 12 3 2013 1018 1025
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.3 , pp. 1018-1025
    • Ren, J.1    Harn, L.2
  • 107
    • 84880049034 scopus 로고    scopus 로고
    • A generic framework for anonymous authentication in mobile networks
    • J. Xu, and W.-T. Zhu A generic framework for anonymous authentication in mobile networks J. Comput. Sci. Technol. 28 4 2013 732 742
    • (2013) J. Comput. Sci. Technol. , vol.28 , Issue.4 , pp. 732-742
    • Xu, J.1    Zhu, W.-T.2
  • 108
    • 84860648863 scopus 로고    scopus 로고
    • A privacy-protecting authentication scheme for roaming services with smart cards
    • K. Son, D. Han, and D. Won A privacy-protecting authentication scheme for roaming services with smart cards IEICE Trans. Commun. 95 5 2012 1819 1821
    • (2012) IEICE Trans. Commun. , vol.95 , Issue.5 , pp. 1819-1821
    • Son, K.1    Han, D.2    Won, D.3
  • 109
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • M. Wiener, Springer Verlag
    • E. Fujisaki, and T. Okamoto Secure integration of asymmetric and symmetric encryption schemes M. Wiener, Proc. CRYPTO 1999, LNCS vol. 1666 1999 Springer Verlag 537 554
    • (1999) Proc. CRYPTO 1999, LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 110
    • 78651364381 scopus 로고    scopus 로고
    • Provable secure authentication protocol with anonymity for roaming service in global mobility networks
    • T. Zhou, and J. Xu Provable secure authentication protocol with anonymity for roaming service in global mobility networks Comput. Netw. 55 1 2011 205 213
    • (2011) Comput. Netw. , vol.55 , Issue.1 , pp. 205-213
    • Zhou, T.1    Xu, J.2
  • 111
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Springer Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway Authenticated key exchange secure against dictionary attacks Proc. EUROCRYPT 2000, LNCS vol. 1807 2000 Springer Verlag 139 155
    • (2000) Proc. EUROCRYPT 2000, LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 112
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • M. Abdalla, P.-A. Fouque, and D. Pointcheval Password-based authenticated key exchange in the three-party setting S. Vaudenay, Proc. PKC 2005, LNCS vol. 3386 2005 Springer Verlag 65 84 (Pubitemid 41231326)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 113
    • 78650941074 scopus 로고    scopus 로고
    • Simplified OAEP for the RSA and Rabin Functions
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh Simplified OAEP for the RSA and Rabin functions J. Kilian, Proc. CRYPTO 2001, LNCS vol. 2139 2001 Springer Verlag 275 291 (Pubitemid 33317921)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 275-291
    • Boneh, D.1
  • 114
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • R. Canetti, O. Goldreich, and S. Halevi The random oracle methodology, revisited J. ACM 51 4 2004 557 594
    • (2004) J. ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 115
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh, and M. Franklin Identity-based encryption from the weil pairing SIAM J. Comput. 32 3 2003 586 615
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 116
    • 84859393217 scopus 로고    scopus 로고
    • Practical rsa signature scheme based on periodical rekeying for wireless sensor networks
    • S.-Y. Chang, Y.-H. Lin, H.-M. Sun, and M.-E. Wu Practical rsa signature scheme based on periodical rekeying for wireless sensor networks ACM Trans. Sen. Network 8 2 2012 13
    • (2012) ACM Trans. Sen. Network , vol.8 , Issue.2 , pp. 13
    • Chang, S.-Y.1    Lin, Y.-H.2    Sun, H.-M.3    Wu, M.-E.4
  • 119
    • 70349154616 scopus 로고    scopus 로고
    • On the application of pairing based cryptography to wireless sensor networks
    • ACM
    • P. Szczechowiak, A. Kargl, M. Scott, and M. Collier On the application of pairing based cryptography to wireless sensor networks Proc. WiSec 2009 2009 ACM 1 12
    • (2009) Proc. WiSec 2009 , pp. 1-12
    • Szczechowiak, P.1    Kargl, A.2    Scott, M.3    Collier, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.