An efficient and secure anonymous mobility network authentication scheme
暂无分享,去创建一个
[1] Dong Hoon Lee,et al. Security flaw of authentication scheme with anonymity for wireless communications , 2009, IEEE Communications Letters.
[2] Wei-Bin Lee,et al. A Secure Authentication Scheme with Anonymity for Wireless Communications , 2008, IEEE Commun. Lett..
[3] Jun-Sub Kim,et al. Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks , 2012 .
[4] Qiong Pu,et al. An Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks , 2010, 2010 Second International Conference on Multimedia and Information Technology.
[5] Dong Hoon Lee,et al. Anonymous authentication with unlinkability for wireless environments , 2011, IEICE Electron. Express.
[6] Chan Yeob Yeun,et al. Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks , 2016, Wireless Personal Communications.
[7] Jing Xu,et al. Security Flaws in Authentication Protocols with Anonymity for Wireless Environments , 2009 .
[8] Cheng-Chi Lee,et al. A novel user authentication and privacy preserving scheme with smart cards for wireless communications , 2012, Math. Comput. Model..
[9] Chin-Chen Chang,et al. Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[10] Jianfeng Ma,et al. A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..
[11] Cheng-Chi Lee,et al. Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.
[12] Zhenfu Cao,et al. On the anonymity of some authentication schemes for wireless communications , 2009, IEEE Commun. Lett..
[13] Jing Xu,et al. Provable secure authentication protocol with anonymity for roaming service in global mobility networks , 2011, Comput. Networks.
[14] Chang-Seop Park,et al. Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems , 2004, Comput. Networks.