-
1
-
-
0029224504
-
On travelling incognito
-
A. Herzberg, H. Krawczyk, and G. Tsudik, "On travelling incognito, " in Proc. IEEE Workshop Mobile Syst. Appl., 1994, pp. 205-211.
-
(1994)
Proc. IEEE Workshop Mobile Syst. Appl
, pp. 205-211
-
-
Herzberg, A.1
Krawczyk, H.2
Tsudik, G.3
-
2
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Feb
-
J. Zhu and J. Ma, "A new authentication scheme with anonymity for wireless environments, " IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 231-235, Feb. 2004.
-
(2004)
IEEE Trans. Consum. Electron
, vol.50
, Issue.1
, pp. 231-235
-
-
Zhu, J.1
Ma, J.2
-
3
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Oct
-
C. C. Lee, M. S. Hwang, and I. E. Liao, "Security enhancement on a new authentication scheme with anonymity for wireless environments, " IEEE Trans. Ind. Electron., vol. 53, no. 5, pp. 1683-1687, Oct. 2006.
-
(2006)
IEEE Trans. Ind. Electron
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
4
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
Oct
-
C. C. Wu, W. B. Lee, and W. J. Tsaur, "A secure authentication scheme with anonymity for wireless communications, " IEEE Commun. Lett., vol. 12, no. 10, pp. 722-723, Oct. 2008.
-
(2008)
IEEE Commun. Lett
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
5
-
-
59649101587
-
Enhance authentication scheme with anonymity for roaming service in global mobility networks
-
Mar
-
C. C. Chang, C. Y. Lee, and Y. C. Chiu, "Enhance authentication scheme with anonymity for roaming service in global mobility networks, " Comput. Commun., vol. 32, no. 4, pp. 611-618, Mar. 2009.
-
(2009)
Comput. Commun
, vol.32
, Issue.4
, pp. 611-618
-
-
Chang, C.C.1
Lee, C.Y.2
Chiu, Y.C.3
-
6
-
-
68349157387
-
Weaknesses in an anonymous authentication scheme for roaming service in global mobile networks
-
Jul
-
T. Y. Youn, T. H. Park, and Lim, "Weaknesses in an anonymous authentication scheme for roaming service in global mobile networks, " IEEE Commun. Lett., vol. 13, no. 7, pp. 471-473, Jul. 2009.
-
(2009)
IEEE Commun. Lett
, vol.13
, Issue.7
, pp. 471-473
-
-
Youn, T.Y.1
Park, T.H.2
Lim3
-
7
-
-
41149155794
-
Mobile privacy in wireless networks revisited
-
Mar
-
C. Tang and D. O. Wu, "Mobile privacy in wireless networks revisited, " IEEE Trans.Wireless Commun., vol. 7, no. 3, pp. 1035-1042, Mar. 2008.
-
(2008)
IEEE Trans.Wireless Commun
, vol.7
, Issue.3
, pp. 1035-1042
-
-
Tang, C.1
Wu, D.O.2
-
8
-
-
78549259372
-
On the security of an efficient mobile authentication scheme for wireless networks
-
J. Lu and J. Zhou, "On the security of an efficient mobile authentication scheme for wireless networks, " in Proc. 6th Int. Conf.WICOM, Sep. 2010, pp. 23-25.
-
(2010)
Proc. 6th Int. Conf.WICOM, Sep
, pp. 23-25
-
-
Lu, J.1
Zhou, J.2
-
9
-
-
78651364381
-
Provable secure authentication protocol with anonymity for roaming service in global mobility networks
-
Jan
-
T. Zhou and J. Xu, "Provable secure authentication protocol with anonymity for roaming service in global mobility networks, " Comput. Netw., vol. 55, no. 1, pp. 205-213, Jan. 2011.
-
(2011)
Comput. Netw
, vol.55
, Issue.1
, pp. 205-213
-
-
Zhou, T.1
Xu, J.2
-
10
-
-
74549210063
-
Universal authentication protocols for anonymous wireless communications
-
Jan
-
G. Yang, Q. Huang, W. S. Duncan, and X. Deng, "Universal authentication protocols for anonymous wireless communications, " IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 168-174, Jan. 2010.
-
(2010)
IEEE Trans. Wireless Commun
, vol.9
, Issue.1
, pp. 168-174
-
-
Yang, G.1
Huang, Q.2
Duncan, W.S.3
Deng, X.4
-
11
-
-
84856471625
-
Secure and efficient handover authentication based on bilinear pairing functions
-
Jan
-
D. He, C. Chen, S. Chan, and J. Bu, "Secure and efficient handover authentication based on bilinear pairing functions, " IEEE Trans. Wireless Commun., vol. 11, no. 1, pp. 48-53, Jan. 2012.
-
(2012)
IEEE Trans. Wireless Commun
, vol.11
, Issue.1
, pp. 48-53
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
12
-
-
84865443877
-
Analysis and improvement of a secure and efficient handover authentication for wireless networks
-
Aug
-
D. He, C. Chen, S. Chan, and J. Bu, "Analysis and improvement of a secure and efficient handover authentication for wireless networks, " IEEE Commun. Lett., vol. 16, no. 8, pp. 1270-1273, Aug. 2012.
-
(2012)
IEEE Commun. Lett
, vol.16
, Issue.8
, pp. 1270-1273
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
13
-
-
84890563211
-
Secure handover authentication protocol based on bilinear pairings
-
Dec
-
J. L. Tsai, N. W. Lo, and T. C. Wu, "Secure handover authentication protocol based on bilinear pairings, " Wireless Pers. Commun., vol. 73, no. 3, pp 1037-1047, Dec. 2013.
-
(2013)
Wireless Pers. Commun
, vol.73
, Issue.3
, pp. 1037-1047
-
-
Tsai, J.L.1
Lo, N.W.2
Wu, T.C.3
-
14
-
-
82755161699
-
Enhanced secure anonymous authentication scheme for roaming service in global mobile network
-
H. Mun, K. Han, Y. Lee, C. Yeun, and H. Choi, "Enhanced secure anonymous authentication scheme for roaming service in global mobile network, " Math. Comput. Model., vol. 55, pp. 214-222, 2012.
-
(2012)
Math. Comput. Model
, vol.55
, pp. 214-222
-
-
Mun, H.1
Han, K.2
Lee, Y.3
Yeun, C.4
Choi, H.5
-
15
-
-
84865142812
-
Improved secure anonymous authentication scheme for roaming service in global mobile network
-
J. Kim and J. Kwak, "Improved secure anonymous authentication scheme for roaming service in global mobile network, " Int. J. Security Appl., vol. 6, no. 3, pp. 45-54, 2012.
-
(2012)
Int. J. Security Appl
, vol.6
, Issue.3
, pp. 45-54
-
-
Kim, J.1
Kwak, J.2
-
16
-
-
84878975055
-
An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks
-
Feb
-
Q. Jiang, J. Ma, G. Li, and L. Yang, "An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks, " Wireless Pers. Commun., vol. 68, no. 4, pp. 1477-1491, Feb. 2013.
-
(2013)
Wireless Pers. Commun
, vol.68
, Issue.4
, pp. 1477-1491
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Yang, L.4
-
17
-
-
84890555385
-
A secure and effective user authentication scheme for roaming service in global mobility networks
-
Dec
-
F. Wen, W. Susilo, and G. Yang, "A secure and effective user authentication scheme for roaming service in global mobility networks, " Wireless Pers. Commun., vol. 73, no. 3, pp. 993-1004, Dec. 2013.
-
(2013)
Wireless Pers. Commun
, vol.73
, Issue.3
, pp. 993-1004
-
-
Wen, F.1
Susilo, W.2
Yang, G.3
-
18
-
-
84895056653
-
Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
-
Jan
-
D. He, Y. Zhang, and J. Chen, "Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks, " Wireless Pers. Commun., vol. 74, no. 2, pp. 229-243, Jan. 2014.
-
(2014)
Wireless Pers. Commun
, vol.74
, Issue.2
, pp. 229-243
-
-
He, D.1
Zhang, Y.2
Chen, J.3
-
19
-
-
84903610110
-
Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets
-
Jul
-
T. Hwang and P. Gope, "Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets, " Wireless Pers. Commun., vol. 77, no. 1, pp. 197-224, Jul. 2014.
-
(2014)
Wireless Pers. Commun
, vol.77
, Issue.1
, pp. 197-224
-
-
Hwang, T.1
Gope, P.2
-
20
-
-
81455149033
-
An efficient delegation-based roaming payment, protocol against denial of service attacks
-
Sep
-
C. H. Wang and C. Y. Lin, "An efficient delegation-based roaming payment, protocol against denial of service attacks, " in Proc. Int. Conf. Electron., Commun. Control, pp. 4136-4140, Sep. 2011.
-
(2011)
Proc. Int. Conf. Electron., Commun. Control
, pp. 4136-4140
-
-
Wang, C.H.1
Lin, C.Y.2
-
21
-
-
84864125413
-
Secure delegation-based authentication protocol for wireless roaming service
-
Jul
-
J. L. Tsai, N. W. Lo, and T. C. Wu, "Secure delegation-based authentication protocol for wireless roaming service, " IEEE Commun. Lett., vol. 16, no. 7, Jul. 2012.
-
(2012)
IEEE Commun. Lett
, vol.16
, Issue.7
-
-
Tsai, J.L.1
Lo, N.W.2
Wu, T.C.3
-
22
-
-
1542593353
-
Authentication and Authenticated Key Exchanges
-
Jun
-
W. Diffie, P. C. van Oorshot, and M. J. Wiener, "Authentication and Authenticated Key Exchanges, " Designs, Codes Cryptogr., vol. 2, no. 2, pp. 107-125, Jun. 1992.
-
(1992)
Designs, Codes Cryptogr
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorshot, P.C.2
Wiener, M.J.3
-
23
-
-
85018066264
-
SKEME: A versatile secure key exchange mechanism for Internet
-
Feb. 22-23
-
H. Krawczyk, "SKEME: A versatile secure key exchange mechanism for Internet, " in Proc. Symp. Netw. Distrib. Syst. Security, Feb. 22-23, 1996, pp. 114-127.
-
(1996)
Proc. Symp. Netw. Distrib. Syst. Security
, pp. 114-127
-
-
Krawczyk, H.1
-
24
-
-
78651440243
-
-
Version 4.2.0, Released 4, 3GPP TS 33.102
-
Security Architecture, Version 4.2.0, Released 4, 3GPP TS 33.102, 2001.
-
(2001)
Security Architecture
-
-
-
26
-
-
84939573910
-
Differential power analysis
-
LNCS, Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis, " in Proc. CRYPTO, 1999, vol. 1666 LNCS, pp. 388-397, Springer-Verlag.
-
(1999)
Proc. CRYPTO
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
27
-
-
38049038695
-
-
Crypto++ Library. [Online] Available: http://www.cryptopp.com
-
Crypto++ Library
-
-
-
31
-
-
0000410707
-
Universal hashing and authentication codes
-
D. R. Stinson, "Universal hashing and authentication codes, " Des. Codes Cryptogr., vol. 4, no. 4, pp. 369-380, 1994.
-
(1994)
Des. Codes Cryptogr
, vol.4
, Issue.4
, pp. 369-380
-
-
Stinson, D.R.1
-
32
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. "A logic of authentication, " ACM Trans. Comput. Syst. (TOCS), vol. 8, no. 1, pp. 18-36, 1990.
-
(1990)
ACM Trans. Comput. Syst. (TOCS)
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
|