Trusted and anonymous authentication scheme for wireless networks
A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide ide...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74649800/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537607583924224 |
---|---|
author | YANG Li1 MA Jian-feng 1 ZHU Jian-ming 2 |
author_facet | YANG Li1 MA Jian-feng 1 ZHU Jian-ming 2 |
author_sort | YANG Li1 |
collection | DOAJ |
description | A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide identity anonymity and platform anonymity, with domain separation property and key agreement process fairness, computation costs and turns of message exchange meet the demand for wireless IP networks security. |
format | Article |
id | doaj-art-4c190a1553fa402ea512c2baba58680f |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2009-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-4c190a1553fa402ea512c2baba58680f2025-01-14T08:28:07ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130293574649800Trusted and anonymous authentication scheme for wireless networksYANG Li1MA Jian-feng 1ZHU Jian-ming 2A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide identity anonymity and platform anonymity, with domain separation property and key agreement process fairness, computation costs and turns of message exchange meet the demand for wireless IP networks security.http://www.joconline.com.cn/zh/article/74649800/trusted computingwireless authentication protocolsremote attestation |
spellingShingle | YANG Li1 MA Jian-feng 1 ZHU Jian-ming 2 Trusted and anonymous authentication scheme for wireless networks Tongxin xuebao trusted computing wireless authentication protocols remote attestation |
title | Trusted and anonymous authentication scheme for wireless networks |
title_full | Trusted and anonymous authentication scheme for wireless networks |
title_fullStr | Trusted and anonymous authentication scheme for wireless networks |
title_full_unstemmed | Trusted and anonymous authentication scheme for wireless networks |
title_short | Trusted and anonymous authentication scheme for wireless networks |
title_sort | trusted and anonymous authentication scheme for wireless networks |
topic | trusted computing wireless authentication protocols remote attestation |
url | http://www.joconline.com.cn/zh/article/74649800/ |
work_keys_str_mv | AT yangli1 trustedandanonymousauthenticationschemeforwirelessnetworks AT majianfeng1 trustedandanonymousauthenticationschemeforwirelessnetworks AT zhujianming2 trustedandanonymousauthenticationschemeforwirelessnetworks |