메뉴 건너뛰기




Volumn 8, Issue 16, 2015, Pages 2850-2859

A privacy preserving authentication scheme for roaming services in global mobility networks

Author keywords

Anonymity; Authentication; Global mobility networks; Roaming authentication

Indexed keywords

AUTHENTICATION; DATA PRIVACY; PUBLIC KEY CRYPTOGRAPHY;

EID: 84944168470     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1209     Document Type: Article
Times cited : (23)

References (27)
  • 1
    • 0031257939 scopus 로고    scopus 로고
    • An authentication technique based on distributed security management for the global mobility network
    • Suzukiz S, Nakada K. An authentication technique based on distributed security management for the global mobility network. IEEE Journal on Selected Areas in Communications 1997; 15(8): 1608-1617.
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.8 , pp. 1608-1617
    • Suzukiz, S.1    Nakada, K.2
  • 2
  • 3
    • 0035135698 scopus 로고    scopus 로고
    • Authentication of mobile users in third generation mobile systems
    • Tzeng ZJ, Tzeng WG. Authentication of mobile users in third generation mobile systems. Wireless Personal Communications 2001; 16(1): 35-50.
    • (2001) Wireless Personal Communications , vol.16 , Issue.1 , pp. 35-50
    • Tzeng, Z.J.1    Tzeng, W.G.2
  • 5
    • 67649519339 scopus 로고    scopus 로고
    • A novel network mobility handoff scheme using SIP and SCTP for multimedia applications
    • Leu FY. A novel network mobility handoff scheme using SIP and SCTP for multimedia applications. Journal of Network and Computer Applications 2009; 32(5): 1073-1091.
    • (2009) Journal of Network and Computer Applications , vol.32 , Issue.5 , pp. 1073-1091
    • Leu, F.Y.1
  • 6
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments.
    • Zhu J, Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004; 50(1): 230-234.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 230-234
    • Zhu, J.1    Ma, J.2
  • 7
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Lee CC, Hwang MS, Liao IE. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006; 53(5): 1683-1687.
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 8
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Wu CC, Lee WB, Tsaur WJ. A secure authentication scheme with anonymity for wireless communications. IEEE Communication Letters 2008; 12(10): 722-723.
    • (2008) IEEE Communication Letters , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 9
    • 58149108946 scopus 로고    scopus 로고
    • An efficient mobile authentication scheme for wireless networks
    • Tang C, Wu DO. An efficient mobile authentication scheme for wireless networks. IEEE Transactions on Wireless Communications 2008; 7(4): 1408-1416.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.4 , pp. 1408-1416
    • Tang, C.1    Wu, D.O.2
  • 10
    • 59649101587 scopus 로고    scopus 로고
    • Enhanced authentication scheme with anonymity for roaming service in global mobility networks
    • Chang CC, Lee CY, Chiu YC. Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 2009; 3(2): 611-618.
    • (2009) Computer Communications , vol.3 , Issue.2 , pp. 611-618
    • Chang, C.C.1    Lee, C.Y.2    Chiu, Y.C.3
  • 11
    • 78449298894 scopus 로고    scopus 로고
    • An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks
    • Chang CC, Tsai HC. An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. IEEE Transactions on Wireless Communications 2010; 9(11): 3346-3353.
    • (2010) IEEE Transactions on Wireless Communications , vol.9 , Issue.11 , pp. 3346-3353
    • Chang, C.C.1    Tsai, H.C.2
  • 12
    • 84865236311 scopus 로고    scopus 로고
    • An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network
    • Fu AM, Zhang YQ, Zhu ZC, Jing Q, Feng JY. An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network. Computers & Security 2012; 31(6): 741-749.
    • (2012) Computers & Security , vol.31 , Issue.6 , pp. 741-749
    • Fu, A.M.1    Zhang, Y.Q.2    Zhu, Z.C.3    Jing, Q.4    Feng, J.Y.5
  • 13
    • 78649983188 scopus 로고    scopus 로고
    • A fast handover authentication mechanism based on ticket for IEEE 802.16m
    • Fu AM, Zhang YQ, Zhu ZC, Liu XF. A fast handover authentication mechanism based on ticket for IEEE 802.16m. IEEE Communication Letters 2010; 14(12): 1134-1140.
    • (2010) IEEE Communication Letters , vol.14 , Issue.12 , pp. 1134-1140
    • Fu, A.M.1    Zhang, Y.Q.2    Zhu, Z.C.3    Liu, X.F.4
  • 14
    • 82755161699 scopus 로고    scopus 로고
    • Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
    • Mun H, Han K, Lee YS, Yeun CY, Choi HH. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling 2012; 55(1- 2): 214-222.
    • (2012) Mathematical and Computer Modelling , vol.55 , Issue.1-2 , pp. 214-222
    • Mun, H.1    Han, K.2    Lee, Y.S.3    Yeun, C.Y.4    Choi, H.H.5
  • 15
    • 84887265696 scopus 로고    scopus 로고
    • A new mutual-authenticated scheme for a smart card in wireless communications
    • Wang CY, Li X, He MX. A new mutual-authenticated scheme for a smart card in wireless communications. Journal of Computational Information Systems 2013; 9(20): 8199-8206.
    • (2013) Journal of Computational Information Systems , vol.9 , Issue.20 , pp. 8199-8206
    • Wang, C.Y.1    Li, X.2    He, M.X.3
  • 17
    • 84886081372 scopus 로고    scopus 로고
    • Secure mobile user authentication and key agreement protocol with privacy protection in global mobility networks
    • Taiwan
    • Xie Q, Bao MJ, Dong N, Hu B. Secure mobile user authentication and key agreement protocol with privacy protection in global mobility networks. In International Symposium on Biometrics and Security Technologies, Taiwan, 2013; 124-129.
    • (2013) International Symposium on Biometrics and Security Technologies , pp. 124-129
    • Xie, Q.1    Bao, M.J.2    Dong, N.3    Hu, B.4
  • 20
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Advances in Cryptology - Crypto'93, California, USA
    • Bellare M, Rogaway P. Entity authentication and key distribution. In Advances in Cryptology - Crypto'93, California, USA, 1993; 232-249.
    • (1993) , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 22
    • 57049187140 scopus 로고    scopus 로고
    • Generalized elGamal public key cryptosystem based on a new Diffie-Hellman problem
    • Huang HW, Yang B, Zhu SL, Xiao GZ. Generalized elGamal public key cryptosystem based on a new Diffie-Hellman problem. Lecture Notes in Computer Science 2008; 5324:1-21.
    • (2008) Lecture Notes in Computer Science , vol.5324 , pp. 1-21
    • Huang, H.W.1    Yang, B.2    Zhu, S.L.3    Xiao, G.Z.4
  • 23
    • 24944540933 scopus 로고    scopus 로고
    • Wireless local area network (WLAN) interworking security
    • 3GPP TS 33.234
    • 3GPP. Wireless local area network (WLAN) interworking security. 3GPP TS 33.234, 2004.
    • (2004)
  • 24
    • 84855203308 scopus 로고    scopus 로고
    • Computational and energy costs of cryptographic algorithms on handheld devices
    • Rif-Pous H, Herrera-Joancomart J. Computational and energy costs of cryptographic algorithms on handheld devices. Future Internet 2011; 3(1): 31-48.
    • (2011) Future Internet , vol.3 , Issue.1 , pp. 31-48
    • Rif-Pous, H.1    Herrera-Joancomart, J.2
  • 25
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • Xu J, Zhou WT, Feng DG. An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 2009; 31(4): 723-728.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhou, W.T.2    Feng, D.G.3
  • 27
    • 84876783591 scopus 로고    scopus 로고
    • Cryptology and the birthday paradox
    • Meijer AR. Cryptology and the birthday paradox. The UMAP Journal 1996; 17(1): 71-84.
    • (1996) The UMAP Journal , vol.17 , Issue.1 , pp. 71-84
    • Meijer, A.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.