ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Introduction to Algorithms
Authentication of Mobile Users in Third Generation Mobile Systems
Wireless Personal Communications: An International Journal
The Performance Measurement of Cryptographic Primitives on Palm Devices
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Performance Analysis of Cryptographic Protocols on Handheld Devices
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
New directions in cryptography
IEEE Transactions on Information Theory
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
An authentication technique based on distributed security management for the global mobility network
IEEE Journal on Selected Areas in Communications
A nonce-based mutual authentication system with smart card
WSEAS Transactions on Computers
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
IEEE Communications Letters
Computer Networks: The International Journal of Computer and Telecommunications Networking
Robust authentication and key agreement scheme preserving the privacy of secret key
Computer Communications
Securing mobile access in ubiquitous networking via non-roaming agreement protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
A user friendly authentication scheme with anonymity for wireless communications
Computers and Electrical Engineering
Wireless Personal Communications: An International Journal
An efficient and secure multi-server authentication scheme with key agreement
Journal of Systems and Software
International Journal of Network Management
An authentication protocol offering service anonymity of mobile device in ubiquitous environment
The Journal of Supercomputing
Security enhanced user authentication scheme for wireless sensor network
International Journal of Electronic Security and Digital Forensics
A secure user-friendly authentication scheme with anonymity for wireless communications
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Wireless Personal Communications: An International Journal
Secure Handover Authentication Protocol Based on Bilinear Pairings
Wireless Personal Communications: An International Journal
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network
Wireless Personal Communications: An International Journal
Hi-index | 0.24 |
User authentication is an important security mechanism for recognizing legal roaming users. In 2006, Lee, Hwang, and Liao proposed an enhanced authentication scheme with user anonymity for roaming environments. This article shows that Lee-Hwang-Liao's scheme cannot provide anonymity under the forgery attack. Moreover, the heavy computation cost may consume battery power expeditiously for mobile devices. Therefore, we propose a novel authentication scheme to overcome these weaknesses that is efficient, secure, and suitable for battery-powered mobile devices in global mobility networks.