A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks

[1]  Jin Kwak,et al.  Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks , 2013, J. Appl. Math..

[2]  Xiao Tan,et al.  Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network , 2013, Wireless Personal Communications.

[3]  W. Zhu,et al.  A Generic Framework for Anonymous Authentication in Mobile Networks , 2013, Journal of Computer Science and Technology.

[4]  Ching-Hsiang Chang,et al.  Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication , 2013, Wirel. Pers. Commun..

[5]  Yuanyuan Zhang,et al.  Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks , 2013, Wireless Personal Communications.

[6]  Guomin Yang,et al.  A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks , 2013, Wireless Personal Communications.

[7]  Juho Kim,et al.  A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[8]  Ashok Kumar Das,et al.  A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications , 2013 .

[9]  Jianfeng Ma,et al.  An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks , 2013, Wirel. Pers. Commun..

[10]  Cheng-Chi Lee,et al.  Extension of an Efficient 3GPP Authentication and Key Agreement Protocol , 2013, Wirel. Pers. Commun..

[11]  Dawei Zhao,et al.  A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure , 2012, Comput. Math. Appl..

[12]  Chun Chen,et al.  Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks , 2011, Wirel. Pers. Commun..

[13]  Eun-Jun Yoon,et al.  A user friendly authentication scheme with anonymity for wireless communications , 2011, Comput. Electr. Eng..

[14]  Chun Chen,et al.  A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..

[15]  Min-Shiang Hwang,et al.  A cocktail protocol with the Authentication and Key Agreement on the UMTS , 2010, J. Syst. Softw..

[16]  Chin-Chen Chang,et al.  Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[17]  Wen-Shenq Juang,et al.  Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards , 2008, IEEE Transactions on Industrial Electronics.

[18]  Xiaotie Deng,et al.  Anonymous and Authenticated Key Exchange for Roaming Networks , 2007, IEEE Transactions on Wireless Communications.

[19]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[20]  Cheng-Chi Lee,et al.  Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.

[21]  Jianfeng Ma,et al.  A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..

[22]  Shigefusa Suzuki,et al.  An Authentication Technique Based on Distributed Security Management for the Global Mobility Network , 1997, IEEE J. Sel. Areas Commun..

[23]  Cheng-Chi Lee,et al.  A novel user authentication and privacy preserving scheme with smart cards for wireless communications , 2012, Math. Comput. Model..

[24]  Jun-Sub Kim,et al.  Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks , 2012 .

[25]  Xiaotie Deng,et al.  Universal authentication protocols for anonymous wireless communications , 2010, IEEE Transactions on Wireless Communications.

[26]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[27]  Kazuhiro Yokoyama,et al.  Elliptic curve cryptosystem , 2000 .