메뉴 건너뛰기




Volumn 8, Issue 4, 2015, Pages 674-683

An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks

Author keywords

Mobile devices; Mutual authentication; Session key agreement; Ubiquitous networks; User anonymity

Indexed keywords

CRYPTOGRAPHY; MOBILE DEVICES; MOBILE SECURITY; MOBILE TELECOMMUNICATION SYSTEMS; UBIQUITOUS COMPUTING; WIRELESS NETWORKS;

EID: 84931577706     PISSN: 19366442     EISSN: 19366450     Source Type: Journal    
DOI: 10.1007/s12083-013-0218-2     Document Type: Article
Times cited : (30)

References (24)
  • 2
    • 0033907037 scopus 로고    scopus 로고
    • Extensions to an authentication technique proposed for the global mobility network
    • Buttyan L, Gbaguidi C, Staamann S, Wilhelm U (2000) Extensions to an authentication technique proposed for the global mobility network. IEEE Trans Commun 48(3):373–376
    • (2000) IEEE Trans Commun , vol.48 , Issue.3 , pp. 373-376
    • Buttyan, L.1    Gbaguidi, C.2    Staamann, S.3    Wilhelm, U.4
  • 3
    • 84860659191 scopus 로고    scopus 로고
    • Mobile device integration of a fingerprint biometric remote authentication scheme
    • Chin LC, Chen CL, Chao YH (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25(5):585–597
    • (2012) Int J Commun Syst , vol.25 , Issue.5 , pp. 585-597
    • Chin, L.C.1    Chen, C.L.2    Chao, Y.H.3
  • 4
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility network
    • Chun C, Daojing H, Sammy C, Jiajun B, Yi G, Rong F (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 24(3):347–362
    • (2011) Int J Commun Syst , vol.24 , Issue.3 , pp. 347-362
    • Chun, C.1    Daojing, H.2    Sammy, C.3    Jiajun, B.4    Yi, G.5    Rong, F.6
  • 5
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
    • (1976) IEEE Trans Inf Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 6
    • 84855586177 scopus 로고    scopus 로고
    • Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks
    • He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 61(2):465–476
    • (2011) Wirel Pers Commun , vol.61 , Issue.2 , pp. 465-476
    • He, D.1    Chan, S.2    Chen, C.3    Bu, J.4    Fan, R.5
  • 7
    • 67649354423 scopus 로고    scopus 로고
    • Design and verification of enhanced secure localization scheme in wireless sensor networks
    • He D, Cui L, Huang H, Ma M (2009) Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(7):1050–1058
    • (2009) IEEE Trans Parallel Distrib Syst , vol.20 , Issue.7 , pp. 1050-1058
    • He, D.1    Cui, L.2    Huang, H.3    Ma, M.4
  • 8
    • 68949121318 scopus 로고    scopus 로고
    • Secure and efficient localization scheme in ultra-wideband sensor networks
    • He D, Cui L, Huang H, Ma M (2009) Secure and efficient localization scheme in ultra-wideband sensor networks. Wirel Pers Commun 50(4):545–561
    • (2009) Wirel Pers Commun , vol.50 , Issue.4 , pp. 545-561
    • He, D.1    Cui, L.2    Huang, H.3    Ma, M.4
  • 9
    • 3042783229 scopus 로고    scopus 로고
    • A self-encryption mechanism for authentication of roaming and teleconference services
    • Hwang KF, Chang CC (2003) A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans Wirel Commun 2(2):400–407
    • (2003) IEEE Trans Wirel Commun , vol.2 , Issue.2 , pp. 400-407
    • Hwang, K.F.1    Chang, C.C.2
  • 10
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • Jiang Y, Lin C, Shen X, Shi M (2006) Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Trans Wirel Commun 5(9):2569–2577
    • (2006) IEEE Trans Wirel Commun , vol.5 , Issue.9 , pp. 2569-2577
    • Jiang, Y.1    Lin, C.2    Shen, X.3    Shi, M.4
  • 11
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis, Proceeding of Advances in Cryptology (CRYPTO’99), Santa Barbara, CA
    • Kocher P, Jaffe J, Jun B (1999) Differential power analysis, Proceeding of Advances in Cryptology (CRYPTO’99), Santa Barbara, CA, U.S.A., pp 388–397
    • (1999) , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 12
    • 67649184080 scopus 로고    scopus 로고
    • Security flaw of authentication scheme with anonymity for wireless communications
    • Lee JS, Chang JH, Leer DH (2009) Security flaw of authentication scheme with anonymity for wireless communications. IEEE Commun Lett 13(5):722–723
    • (2009) IEEE Commun Lett , vol.13 , Issue.5 , pp. 722-723
    • Lee, J.S.1    Chang, J.H.2    Leer, D.H.3
  • 13
    • 33947102781 scopus 로고    scopus 로고
    • User authentication with anonymity for global mobility networks, In Proceedings of IEE Mobility Conference 2005: The Second Asia Pacific Conference on Mobile Technology, Applications and Systems, Guangzhou
    • Lee CY, Chang CC, Lin CH (2005) User authentication with anonymity for global mobility networks, In Proceedings of IEE Mobility Conference 2005: The Second Asia Pacific Conference on Mobile Technology, Applications and Systems, Guangzhou, China, pp 1–5
    • (2005) China
    • Lee, C.Y.1    Chang, C.C.2    Lin, C.H.3
  • 14
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Lee CC, Hwang MS, Liao IE (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 53(5):1683–1687
    • (2006) IEEE Trans Consum Electron , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 15
    • 33947106463 scopus 로고    scopus 로고
    • Cryptanalysis of a new authentication scheme with anonymity for wireless environments, In Proceedings of the Second International Conference on Advances in Mobile Multimedia, Bali
    • Lin CH, Lee CY (2004) Cryptanalysis of a new authentication scheme with anonymity for wireless environments, In Proceedings of the Second International Conference on Advances in Mobile Multimedia, Bali, Indonesia, pp 339–402
    • (2004) Indonesia , pp. 339-402
    • Lin, C.H.1    Lee, C.Y.2
  • 16
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
    • (2002) IEEE Trans Comput , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 19
    • 0031257939 scopus 로고    scopus 로고
    • An authentication technique based on distributed security management for the global mobility network
    • Suzuki S, Nakada K (1997) An authentication technique based on distributed security management for the global mobility network. IEEE J Sel Areas Commun 15(8):1608–1617
    • (1997) IEEE J Sel Areas Commun , vol.15 , Issue.8 , pp. 1608-1617
    • Suzuki, S.1    Nakada, K.2
  • 20
    • 0035135698 scopus 로고    scopus 로고
    • Authentication of mobile users in third generation mobile systems
    • Tzeng ZJ, Tzeng WG (2011) Authentication of mobile users in third generation mobile systems. Wirel Pers Commun 16(1):35–50
    • (2011) Wirel Pers Commun , vol.16 , Issue.1 , pp. 35-50
    • Tzeng, Z.J.1    Tzeng, W.G.2
  • 21
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Wu CC, Lee WB, Tsaur WJ (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723
    • (2008) IEEE Commun Lett , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 22
    • 78751650071 scopus 로고    scopus 로고
    • An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    • Xu J, Zhu WT, Feng DG (2011) An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput Commun 34(3):319–325
    • (2011) Comput Commun , vol.34 , Issue.3 , pp. 319-325
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 23
    • 63649131787 scopus 로고    scopus 로고
    • On the anonymity of some authentication schemes for wireless communications
    • Zeng P, Cao Z, Choo KK, Wang S (2009) On the anonymity of some authentication schemes for wireless communications. IEEE Commun Lett 13(3):170–171
    • (2009) IEEE Commun Lett , vol.13 , Issue.3 , pp. 170-171
    • Zeng, P.1    Cao, Z.2    Choo, K.K.3    Wang, S.4
  • 24
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):230–234
    • (2004) IEEE Trans Consum Electron , vol.50 , Issue.1 , pp. 230-234
    • Zhu, J.1    Ma, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.