Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications
暂无分享,去创建一个
[1] David Chaum,et al. Blind Signature System , 1983, CRYPTO.
[2] Jianfeng Ma,et al. A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..
[3] Markus Jakobsson,et al. Revokable and versatile electronic money (extended abstract) , 1996, CCS '96.
[4] Dogan Kesdogan,et al. Secure location information management in cellular radio systems , 1995, IEEE Wireless Communication System Symposium.
[5] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[6] Chin-Chen Chang,et al. A self-encryption mechanism for authentication of roaming and teleconference services , 2003, IEEE Trans. Wirel. Commun..
[7] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[8] Yi Mu,et al. A new scheme of credit based payment for electronic commerce , 1998, Proceedings 23rd Annual Conference on Local Computer Networks. LCN'98 (Cat. No.98TB100260).
[9] Hung-Wen Yang,et al. A secure and efficient authentication protocol for anonymous channel in wireless communications , 2005, Appl. Math. Comput..
[10] N. Asokan,et al. Anonymity in a Mobile Computing Environment , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[11] Konrad S. Wrona,et al. Fair electronic cash withdrawal and change return for wireless networks , 2001, WMC '01.
[12] Aggelos Kiayias,et al. A Solution for Wireless Privacy and Payments based on E-cash , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[13] Qi He,et al. The quest for personal control over mobile location privacy , 2004, IEEE Communications Magazine.
[14] Maximilian Ott,et al. Source-location privacy for networks of energy-constrained sensors , 2004 .
[15] Young Ik Eom,et al. An efficient authentication protocol supporting privacy in mobile computing environments , 2002, 5th IEEE International Conference on High Speed Networks and Multimedia Communication (Cat. No.02EX612).
[16] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[17] Jinn-ke Jan,et al. A wireless-based authentication and anonymous channels for large scale area , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.
[18] N. Asokan,et al. Untraceability in mobile networks , 1995, MobiCom '95.