Efficient and robust identity‐based handoff authentication for EAP‐based wireless networks
暂无分享,去创建一个
Yinghui Zhang | Xiaofeng Chen | Hui Li | Qi Han | Jiaxiang Quan | Hui Li | Xiaofeng Chen | Yinghui Zhang | Qi Han | Jiaxiang Quan
[1] Eun-Jun Yoon,et al. Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing , 2010, IEICE Trans. Inf. Syst..
[2] Anmin Fu,et al. A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[3] Giuseppe Ateniese,et al. On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.
[4] Jin Cao,et al. A simple and robust handover authentication between HeNB and eNB in LTE networks , 2012, Comput. Networks.
[5] Anand R. Prasad,et al. Fast Authentication for Inter-domain Handover , 2004, ICT.
[6] Lein Harn,et al. Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families , 2010, Comput. J..
[7] H. Li,et al. Identity-based construction for secure and efficient handoff authentication schemes in wireless networks , 2012, Secur. Commun. Networks.
[8] Yanghee Choi,et al. Fast handoff scheme based on mobility prediction in public wireless LAN systems , 2004 .
[9] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) , 2004, RFC.
[10] Shyhtsun Felix Wu,et al. A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network , 2005, WISA.
[11] Yi Mu,et al. Efficient Generic On-Line/Off-Line Signatures Without Key Exposure , 2007, ACNS.
[12] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[13] Silvio Micali,et al. On-line/off-line digital signatures , 1996, Journal of Cryptology.
[14] William A. Arbaugh,et al. Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.
[15] Hugo Krawczyk,et al. Chameleon Hashing and Signatures , 1998, IACR Cryptol. ePrint Arch..
[16] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[17] Kwangjo Kim,et al. Chameleon Hashing Without Key Exposure , 2004, ISC.
[18] Souhwan Jung,et al. A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6 , 2008, IEICE Trans. Commun..
[19] Yi Mu,et al. Efficient generic on-line/off-line (threshold) signatures without key exposure , 2008, Inf. Sci..
[20] Giuseppe Ateniese,et al. Identity-Based Chameleon Hash and Applications , 2004, Financial Cryptography.
[21] Souhwan Jung,et al. A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.
[22] Yael Tauman Kalai,et al. Improved Online/Offline Signature Schemes , 2001, CRYPTO.
[23] Wei Ren,et al. SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography , 2007, 2007 IEEE International Conference on Communications.
[24] Christos Politis,et al. Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks , 2004, IEEE Wirel. Commun..
[25] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[26] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[27] A. Shamir,et al. Improved On-line / Off-line Signature Schemes , 2022 .
[28] Pin-Han Ho,et al. A Location Privacy Preserving Authentication Scheme in Vehicular Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.