An Efficient User Authentication Scheme with Smart Cards for Wireless Communications
暂无分享,去创建一个
[1] Dongho Won,et al. Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[2] Chin-Chen Chang,et al. An on-line electronic check system with mutual authentication , 2009, Comput. Electr. Eng..
[3] Chun Chen,et al. A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..
[4] Wei-Bin Lee,et al. A new method for using hash functions to solve remote user authentication , 2008, Comput. Electr. Eng..
[5] Cheng-Chi Lee,et al. A novel user authentication and privacy preserving scheme with smart cards for wireless communications , 2012, Math. Comput. Model..
[6] Jiann-Liang Chen,et al. Enhancing WLAN/UMTS Dual-Mode Services Using a Novel Distributed Multi-Agent Scheduling Scheme , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).
[7] Dongho Won,et al. Enhancement of two-factor authenticated key exchange protocols in public wireless LANs , 2010, Comput. Electr. Eng..
[8] Hongke Zhang,et al. A network-based mobility management scheme for future Internet , 2010, Comput. Electr. Eng..
[9] Sheng Zhong. Identity-based mix: Anonymous communications without public key certificates , 2009, Comput. Electr. Eng..
[10] Qiong Pu,et al. An Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks , 2010, 2010 Second International Conference on Multimedia and Information Technology.
[11] Jianfeng Ma,et al. A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..
[12] Dongho Won,et al. Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[13] Wei-Bin Lee,et al. A Secure Authentication Scheme with Anonymity for Wireless Communications , 2008, IEEE Commun. Lett..
[14] Dong Hoon Lee,et al. Security flaw of authentication scheme with anonymity for wireless communications , 2009, IEEE Communications Letters.
[15] Cheng-Chi Lee,et al. Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.
[16] Wen-Shenq Juang,et al. Two efficient two-factor authenticated key exchange protocols in public wireless LANs , 2009, Comput. Electr. Eng..
[17] Zhenfu Cao,et al. An efficient anonymous authentication mechanism for delay tolerant networks , 2010, Comput. Electr. Eng..
[18] Sheng Zhong. Efficient, anonymous, and authenticated conference key setup in cellular wireless networks , 2008, Comput. Electr. Eng..
[19] Dongho Won,et al. Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks , 2008, IEEE Communications Letters.
[20] Wei-Bin Lee,et al. A self-verification authentication mechanism for mobile satellite communication systems , 2009, Comput. Electr. Eng..