메뉴 건너뛰기




Volumn 94, Issue 3, 2017, Pages 1281-1296

Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks

Author keywords

Anonymity authentication; Dynamic ID; Key agreement; Mobile environment; Roaming environment

Indexed keywords

ALUMINUM; CRYPTOGRAPHY; HASH FUNCTIONS; MOBILE DEVICES; MOBILE SECURITY;

EID: 84986267432     PISSN: 09296212     EISSN: 1572834X     Source Type: Journal    
DOI: 10.1007/s11277-016-3682-1     Document Type: Article
Times cited : (26)

References (22)
  • 1
    • 0032024872 scopus 로고    scopus 로고
    • Survivable mobile phone network architectures: models and solution methods
    • Alevras, D., Grotschel, M., Jonas, P., Paul, U., & Wessaly, R. (1998). Survivable mobile phone network architectures: models and solution methods. IEEE Communications Magazine, 36(3), 88–93.
    • (1998) IEEE Communications Magazine , vol.36 , Issue.3 , pp. 88-93
    • Alevras, D.1    Grotschel, M.2    Jonas, P.3    Paul, U.4    Wessaly, R.5
  • 3
    • 59649101587 scopus 로고    scopus 로고
    • Enhanced Authentication scheme with anonymity for roaming service in global networks
    • Chang, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhanced Authentication scheme with anonymity for roaming service in global networks. Computer Communications, 32(4), 611–618.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 611-618
    • Chang, C.C.1    Lee, C.Y.2    Chiu, Y.C.3
  • 4
    • 0031678247 scopus 로고    scopus 로고
    • Improving the fault tolerance of GSM networks
    • Chang, M. F., Lin, Y. B., & Su, S. C. (1998). Improving the fault tolerance of GSM networks. IEEE Network, 12(1), 58–63.
    • (1998) IEEE Network , vol.12 , Issue.1 , pp. 58-63
    • Chang, M.F.1    Lin, Y.B.2    Su, S.C.3
  • 5
    • 85027455461 scopus 로고    scopus 로고
    • Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks
    • Gope, P., & Hwang, T. (2015). Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Systems Journal,. doi:10.1109/JSYST.2015.2416396.
    • (2015) IEEE Systems Journal
    • Gope, P.1    Hwang, T.2
  • 6
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 367-374
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5
  • 7
    • 0034512548 scopus 로고    scopus 로고
    • Security architecture for wireless residential networks. In Proceedings of Vehicular Technology Conference
    • Panama, Program
    • Krishnamurthy, P., & Kabara, J. (2000). Security architecture for wireless residential networks. In Proceedings of Vehicular Technology Conference. IEEE VTS-Fall VTC 2000. 52nd, Telecommun. (vol. 4, pp. 1990–1996). Panama, Program.
    • (2000) IEEE VTS-Fall VTC 2000. 52nd, Telecommun. , vol.4 , pp. 1990-1996
    • Krishnamurthy, P.1    Kabara, J.2
  • 8
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 10
    • 33645695288 scopus 로고    scopus 로고
    • Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information
    • Long, M., & Wu, C. H. J. (2006). Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information. IEEE Transactions on Industrial Informatics, 2(1), 40–47.
    • (2006) IEEE Transactions on Industrial Informatics , vol.2 , Issue.1 , pp. 40-47
    • Long, M.1    Wu, C.H.J.2
  • 11
    • 82755161699 scopus 로고    scopus 로고
    • Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
    • Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55(1–2), 214–222.
    • (2012) Mathematical and Computer Modelling , vol.55 , Issue.1-2 , pp. 214-222
    • Mun, H.1    Han, K.2    Lee, Y.S.3    Yeun, C.Y.4    Choi, H.H.5
  • 14
  • 15
    • 0035135698 scopus 로고    scopus 로고
    • Authentication of mobile users in third generation mobile system
    • Tzeng, Z. J., & Tzeng, W. G. (2001). Authentication of mobile users in third generation mobile system. Wireless Personal Communications, 16(1), 35–50.
    • (2001) Wireless Personal Communications , vol.16 , Issue.1 , pp. 35-50
    • Tzeng, Z.J.1    Tzeng, W.G.2
  • 16
    • 68949149518 scopus 로고    scopus 로고
    • Security flaws in authentication protocols with anonymity for wireless environments
    • Xu, J., & Feng, D. (2009). Security flaws in authentication protocols with anonymity for wireless environments. ETRI Journal, 31(4), 460–462.
    • (2009) ETRI Journal , vol.31 , Issue.4 , pp. 460-462
    • Xu, J.1    Feng, D.2
  • 18
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Wu, C. C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722–723.
    • (2008) IEEE Communications Letters , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 19
    • 84856430473 scopus 로고    scopus 로고
    • Security improvement on an anonymous key agreement protocol based on chaotic maps
    • Xue, K., & Hong, P. (2012). Security improvement on an anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 17(7), 2969–2977.
    • (2012) Communications in Nonlinear Science and Numerical Simulation , vol.17 , Issue.7 , pp. 2969-2977
    • Xue, K.1    Hong, P.2
  • 20
    • 63649131787 scopus 로고    scopus 로고
    • On the anonymity of some authentication schemes for wireless communications
    • Zeng, P., Cao, Z., Choo, K. K. R., & Wang, S. (2009). On the anonymity of some authentication schemes for wireless communications. IEEE Communications Letters, 13(3), 170–171.
    • (2009) IEEE Communications Letters , vol.13 , Issue.3 , pp. 170-171
    • Zeng, P.1    Cao, Z.2    Choo, K.K.R.3    Wang, S.4
  • 21
    • 84906345040 scopus 로고    scopus 로고
    • A secure and effective anonymous authentication scheme for roaming service in global mobility networks
    • Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247–269.
    • (2014) Wireless Personal Communications , vol.78 , Issue.1 , pp. 247-269
    • Zhao, D.1    Peng, H.2    Li, L.3    Yang, Y.4
  • 22
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 231–235.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 231-235
    • Zhu, J.1    Ma, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.