Enhanced authentication scheme with anonymity for roaming service in global mobility networks
暂无分享,去创建一个
[1] Jongin Lim,et al. Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks , 2009, IEEE Communications Letters.
[2] Wei-Bin Lee,et al. A Secure Authentication Scheme with Anonymity for Wireless Communications , 2008, IEEE Commun. Lett..
[3] M.R. Doomun,et al. Energy consumption and computational analysis of rijndael-AES , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.
[4] Dongho Won,et al. Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[5] Falko Dressler,et al. Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[6] Cheng-Chi Lee,et al. Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.
[7] Falko Dressler,et al. Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[8] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[9] Chu-Hsing Lin,et al. Cryptanalysis of a New Authentication Scheme with Anonymity for Wireless Environments , 2004 .
[10] Hitesh Tewari,et al. Performance analysis of cryptographic protocols on handheld devices , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[11] Jianfeng Ma,et al. A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..
[12] Chin-Chen Chang,et al. A self-encryption mechanism for authentication of roaming and teleconference services , 2003, IEEE Trans. Wirel. Commun..
[13] Duncan S. Wong,et al. The performance measurement of cryptographic primitives on palm devices , 2001, Seventeenth Annual Computer Security Applications Conference.
[14] Clifford Stein,et al. Introduction to Algorithms, 2nd edition. , 2001 .
[15] Wen-Guey Tzeng,et al. Authentication of Mobile Users in Third Generation Mobile Systems , 2001, Wirel. Pers. Commun..
[16] Levente Buttyán,et al. Extensions to an authentication technique proposed for the global mobility network , 2000, IEEE Trans. Commun..
[17] Shigefusa Suzuki,et al. An Authentication Technique Based on Distributed Security Management for the Global Mobility Network , 1997, IEEE J. Sel. Areas Commun..
[18] Paul Syverson,et al. A Taxonomy of Replay Attacks , 1994 .
[19] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[20] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[21] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[22] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.