-
2
-
-
0033907037
-
Extensions to an authentication technique proposed for the global mobility network
-
Buttyan L, Gbaguidi C, Staamann S, Wilhelm U (2000) Extensions to an authentication technique proposed for the global mobility network. IEEE Trans Commun 48(3):373–376
-
(2000)
IEEE Trans Commun
, vol.48
, Issue.3
, pp. 373-376
-
-
Buttyan, L.1
Gbaguidi, C.2
Staamann, S.3
Wilhelm, U.4
-
3
-
-
84860659191
-
Mobile device integration of a fingerprint biometric remote authentication scheme
-
Chin LC, Chen CL, Chao YH (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25(5):585–597
-
(2012)
Int J Commun Syst
, vol.25
, Issue.5
, pp. 585-597
-
-
Chin, L.C.1
Chen, C.L.2
Chao, Y.H.3
-
4
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
Chun C, Daojing H, Sammy C, Jiajun B, Yi G, Rong F (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 24(3):347–362
-
(2011)
Int J Commun Syst
, vol.24
, Issue.3
, pp. 347-362
-
-
Chun, C.1
Daojing, H.2
Sammy, C.3
Jiajun, B.4
Yi, G.5
Rong, F.6
-
6
-
-
84855586177
-
Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks
-
He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 61(2):465–476
-
(2011)
Wirel Pers Commun
, vol.61
, Issue.2
, pp. 465-476
-
-
He, D.1
Chan, S.2
Chen, C.3
Bu, J.4
Fan, R.5
-
7
-
-
67649354423
-
Design and verification of enhanced secure localization scheme in wireless sensor networks
-
He D, Cui L, Huang H, Ma M (2009) Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(7):1050–1058
-
(2009)
IEEE Trans Parallel Distrib Syst
, vol.20
, Issue.7
, pp. 1050-1058
-
-
He, D.1
Cui, L.2
Huang, H.3
Ma, M.4
-
8
-
-
68949121318
-
Secure and efficient localization scheme in ultra-wideband sensor networks
-
He D, Cui L, Huang H, Ma M (2009) Secure and efficient localization scheme in ultra-wideband sensor networks. Wirel Pers Commun 50(4):545–561
-
(2009)
Wirel Pers Commun
, vol.50
, Issue.4
, pp. 545-561
-
-
He, D.1
Cui, L.2
Huang, H.3
Ma, M.4
-
9
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
Hwang KF, Chang CC (2003) A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans Wirel Commun 2(2):400–407
-
(2003)
IEEE Trans Wirel Commun
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.F.1
Chang, C.C.2
-
10
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
Jiang Y, Lin C, Shen X, Shi M (2006) Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Trans Wirel Commun 5(9):2569–2577
-
(2006)
IEEE Trans Wirel Commun
, vol.5
, Issue.9
, pp. 2569-2577
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
11
-
-
84939573910
-
Differential power analysis, Proceeding of Advances in Cryptology (CRYPTO’99), Santa Barbara, CA
-
Kocher P, Jaffe J, Jun B (1999) Differential power analysis, Proceeding of Advances in Cryptology (CRYPTO’99), Santa Barbara, CA, U.S.A., pp 388–397
-
(1999)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
12
-
-
67649184080
-
Security flaw of authentication scheme with anonymity for wireless communications
-
Lee JS, Chang JH, Leer DH (2009) Security flaw of authentication scheme with anonymity for wireless communications. IEEE Commun Lett 13(5):722–723
-
(2009)
IEEE Commun Lett
, vol.13
, Issue.5
, pp. 722-723
-
-
Lee, J.S.1
Chang, J.H.2
Leer, D.H.3
-
13
-
-
33947102781
-
User authentication with anonymity for global mobility networks, In Proceedings of IEE Mobility Conference 2005: The Second Asia Pacific Conference on Mobile Technology, Applications and Systems, Guangzhou
-
Lee CY, Chang CC, Lin CH (2005) User authentication with anonymity for global mobility networks, In Proceedings of IEE Mobility Conference 2005: The Second Asia Pacific Conference on Mobile Technology, Applications and Systems, Guangzhou, China, pp 1–5
-
(2005)
China
-
-
Lee, C.Y.1
Chang, C.C.2
Lin, C.H.3
-
14
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee CC, Hwang MS, Liao IE (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 53(5):1683–1687
-
(2006)
IEEE Trans Consum Electron
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
15
-
-
33947106463
-
Cryptanalysis of a new authentication scheme with anonymity for wireless environments, In Proceedings of the Second International Conference on Advances in Mobile Multimedia, Bali
-
Lin CH, Lee CY (2004) Cryptanalysis of a new authentication scheme with anonymity for wireless environments, In Proceedings of the Second International Conference on Advances in Mobile Multimedia, Bali, Indonesia, pp 339–402
-
(2004)
Indonesia
, pp. 339-402
-
-
Lin, C.H.1
Lee, C.Y.2
-
16
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
-
(2002)
IEEE Trans Comput
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
19
-
-
0031257939
-
An authentication technique based on distributed security management for the global mobility network
-
Suzuki S, Nakada K (1997) An authentication technique based on distributed security management for the global mobility network. IEEE J Sel Areas Commun 15(8):1608–1617
-
(1997)
IEEE J Sel Areas Commun
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzuki, S.1
Nakada, K.2
-
20
-
-
0035135698
-
Authentication of mobile users in third generation mobile systems
-
Tzeng ZJ, Tzeng WG (2011) Authentication of mobile users in third generation mobile systems. Wirel Pers Commun 16(1):35–50
-
(2011)
Wirel Pers Commun
, vol.16
, Issue.1
, pp. 35-50
-
-
Tzeng, Z.J.1
Tzeng, W.G.2
-
21
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
Wu CC, Lee WB, Tsaur WJ (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723
-
(2008)
IEEE Commun Lett
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
22
-
-
78751650071
-
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
-
Xu J, Zhu WT, Feng DG (2011) An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput Commun 34(3):319–325
-
(2011)
Comput Commun
, vol.34
, Issue.3
, pp. 319-325
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
23
-
-
63649131787
-
On the anonymity of some authentication schemes for wireless communications
-
Zeng P, Cao Z, Choo KK, Wang S (2009) On the anonymity of some authentication schemes for wireless communications. IEEE Commun Lett 13(3):170–171
-
(2009)
IEEE Commun Lett
, vol.13
, Issue.3
, pp. 170-171
-
-
Zeng, P.1
Cao, Z.2
Choo, K.K.3
Wang, S.4
-
24
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):230–234
-
(2004)
IEEE Trans Consum Electron
, vol.50
, Issue.1
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
|