ID-based wireless authentication scheme with anonymity
Considered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in d...
Saved in:
Main Authors: | ZHU Hui, LI Hui, SHU Wan-li, WANG Yu-min |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74652813/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Direct anonymous authentication scheme for wireless networks under trusted computing
by: YANG Li1, et al.
Published: (2010-01-01) -
Identity-based anonymity authentication protocol in the heterogeneous wireless network
by: HOU Hui-fang1, et al.
Published: (2011-01-01) -
Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network
by: Shun ZHANG, et al.
Published: (2018-04-01) -
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
by: Yuehui CHEN, et al.
Published: (2016-05-01) -
Anonymous authentication scheme based on one-off public key in pervasive computing environments
by: Chang-yuan LUO, et al.
Published: (2012-02-01)