Security flaws and improvement to a wireless authentication protocol with anonymity
The anonymous security flaw of an authentication protocol with anonymity for wireless networks which was proposed by Zhu, et al. was analyzed, and an improved protocol to a wireless authentication protocol with anonymity (IWAA) was proposed. The anonymous security of the improved protocol was analyz...
Saved in:
Main Authors: | PENG Hua-xi, FENG Deng-guo |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2006-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74659916/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Design of anonymous authentication protocol for RFID
by: DENG Miao-lei, et al.
Published: (2009-01-01) -
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
by: Vincent Omollo Nyangaresi, et al.
Published: (2025-01-01) -
Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network
by: Shun ZHANG, et al.
Published: (2018-04-01) -
Anonymous and authenticated routing protocol for mobile ad hoc networks
by: LI Xiao-qing, et al.
Published: (2009-01-01) -
Direct anonymous authentication scheme for wireless networks under trusted computing
by: YANG Li1, et al.
Published: (2010-01-01)