A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
Published 2015 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
Authors
Keywords
-
Journal
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
Volume 30, Issue 4, Pages e3019
Publisher
Wiley
Online
2015-07-15
DOI
10.1002/dac.3019
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks
- (2015) Mohammad Sabzinejad Farash et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
- (2015) Shehzad Ashraf Chaudhry et al. JOURNAL OF MEDICAL SYSTEMS
- An enhanced privacy preserving remote user authentication scheme with provable security
- (2015) Shehzad Ashraf Chaudhry et al. Security and Communication Networks
- An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems
- (2014) M. S. Farash et al. Information Technology and Control
- Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’
- (2014) Mohammad Sabzinejad Farash International Journal of Network Management
- An efficient client–client password-based authentication scheme with provable security
- (2014) Mohammad Sabzinejad Farash et al. JOURNAL OF SUPERCOMPUTING
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- (2014) Mohammad Sabzinejad Farash et al. NONLINEAR DYNAMICS
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- (2014) Mohammad Sabzinejad Farash et al. NONLINEAR DYNAMICS
- A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
- (2013) Azeem Irshad et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
- (2013) Azeem Irshad et al. Security and Communication Networks
- More secure smart card-based remote user password authentication scheme with user anonymity
- (2013) Saru Kumari et al. Security and Communication Networks
- Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network
- (2013) Qi Xie et al. WIRELESS PERSONAL COMMUNICATIONS
- A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks
- (2013) Fengtong Wen et al. WIRELESS PERSONAL COMMUNICATIONS
- An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
- (2013) Soobok Shin et al. Peer-to-Peer Networking and Applications
- An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks
- (2012) Qi Jiang et al. WIRELESS PERSONAL COMMUNICATIONS
- A novel user authentication and privacy preserving scheme with smart cards for wireless communications
- (2011) Chun-Ta Li et al. MATHEMATICAL AND COMPUTER MODELLING
- Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
- (2011) Hyeran Mun et al. MATHEMATICAL AND COMPUTER MODELLING
- Lightweight and provably secure user authentication with anonymity for the global mobility network
- (2010) Chun Chen et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- A practical authentication protocol with anonymity for wireless access networks
- (2010) Yen-Cheng Chen et al. WIRELESS COMMUNICATIONS & MOBILE COMPUTING
- Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks
- (2010) Daojing He et al. WIRELESS PERSONAL COMMUNICATIONS
- Enhanced authentication scheme with anonymity for roaming service in global mobility networks
- (2008) Chin-Chen Chang et al. COMPUTER COMMUNICATIONS
- A Secure Authentication Scheme with Anonymity for Wireless Communications
- (2008) Chia-Chun Wu et al. IEEE COMMUNICATIONS LETTERS
- A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
- (2007) Chun-Ta Li et al. COMPUTER COMMUNICATIONS
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started