Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
暂无分享,去创建一个
[1] Cheng-Chi Lee,et al. Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.
[2] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[3] Debiao He. Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications , 2012 .
[4] Lein Harn,et al. Authentication in wireless communications , 1993, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference.
[5] Bin Wang,et al. A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme , 2012, Wireless Personal Communications.
[6] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[7] Jianfeng Ma,et al. A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..
[8] SeongHan Shin,et al. Protocols for Authenticated Anonymous Communications , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[9] Alberto Peinado,et al. Privacy and authentication protocol providing anonymous channels in GSM , 2004, Comput. Commun..
[10] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[11] Hung-Wen Yang,et al. A secure and efficient authentication protocol for anonymous channel in wireless communications , 2005, Appl. Math. Comput..
[12] Ana M. Barbancho,et al. Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications , 2003, Comput. Networks.
[13] Debiao He,et al. Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment , 2012, Wireless Personal Communications.
[14] Hideki Imai,et al. Security in Wireless Communication , 2002, Wirel. Pers. Commun..
[15] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[16] Yen-Cheng Chen,et al. A practical authentication protocol with anonymity for wireless access networks , 2011, Wirel. Commun. Mob. Comput..
[17] Samir Kouro,et al. Unidimensional Modulation Technique for Cascaded Multilevel Converters , 2009, IEEE Transactions on Industrial Electronics.
[18] Jian Ma,et al. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards , 2012, J. Netw. Comput. Appl..
[19] Jenq-Shiou Leu,et al. Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks , 2014, Wirel. Commun. Mob. Comput..
[20] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[21] Jinn-ke Jan,et al. A wireless-based authentication and anonymous channels for large scale area , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.
[22] W.-S. Juang,et al. Anonymous channel and authentication in wireless communications , 1999, Comput. Commun..