Anonymous two-factor authentication for consumer roaming service in global mobility networks
暂无分享,去创建一个
Debiao He | Muhammad Khurram Khan | Neeraj Kumar | Jong-Hyouk Lee | Neeraj Kumar | D. He | M. Khan | Jong‐Hyouk Lee
[1] Dong Hoon Lee,et al. PACPs: practical access control protocols for wireless sensor networks , 2012, IEEE Transactions on Consumer Electronics.
[2] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[3] Kwangjo Kim,et al. Efficient mobile sensor authentication in smart home and WPAN , 2010, IEEE Transactions on Consumer Electronics.
[4] Chin-Chen Chang,et al. Enhanced authentication scheme with anonymity for roaming service in global mobility networks , 2009, Comput. Commun..
[5] Cheng-Chi Lee,et al. Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.
[6] Jianfeng Ma,et al. An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks , 2012, Wireless Personal Communications.
[7] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[8] Dengguo Feng,et al. An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks , 2011, Comput. Commun..
[9] Chun Chen,et al. Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks , 2011, Wirel. Pers. Commun..
[10] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[11] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[12] Yen-Cheng Chen,et al. A practical authentication protocol with anonymity for wireless access networks , 2011, Wirel. Commun. Mob. Comput..
[13] Jianfeng Ma,et al. A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..
[14] Bruno Blanchet,et al. Models and Proofs of Protocol Security: A Progress Report , 2009, CAV.
[15] Jongin Lim,et al. Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks , 2009, IEEE Communications Letters.
[16] Wei-Bin Lee,et al. A Secure Authentication Scheme with Anonymity for Wireless Communications , 2008, IEEE Commun. Lett..
[17] Chun Chen,et al. Lightweight and provably secure user authentication with anonymity for the global mobility network , 2011, Int. J. Commun. Syst..
[18] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[19] Chun Chen,et al. A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..
[20] Cheng-Chi Lee,et al. A novel user authentication and privacy preserving scheme with smart cards for wireless communications , 2012, Math. Comput. Model..
[21] Joonsang Baek,et al. An efficient and scalable re-authentication protocol over wireless sensor network , 2011, IEEE Transactions on Consumer Electronics.
[22] Jung-Hui Chiu,et al. A fast iterative localized re-authentication protocol for heterogeneous mobile networks , 2010, IEEE Transactions on Consumer Electronics.
[23] Xiao Tan,et al. Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network , 2013, Wireless Personal Communications.
[24] Chan Yeob Yeun,et al. Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks , 2016, Wireless Personal Communications.