Security flaw of authentication scheme with anonymity for wireless communications
IEEE Communications Letters
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
On the anonymity of some authentication schemes for wireless communications
IEEE Communications Letters
Security flaw of authentication scheme with anonymity for wireless communications
IEEE Communications Letters
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
IEEE Communications Letters
A strong user authentication scheme with smart cards for wireless communications
Computer Communications
A user friendly authentication scheme with anonymity for wireless communications
Computers and Electrical Engineering
Wireless Personal Communications: An International Journal
Cryptanalysis of the user authentication scheme with anonymity
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Security enhanced user authentication scheme for wireless sensor network
International Journal of Electronic Security and Digital Forensics
A secure user-friendly authentication scheme with anonymity for wireless communications
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Wireless Personal Communications: An International Journal
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Recently, Wu et al. discussed some security flaws of enhanced authentication scheme with anonymity for wireless environments proposed by Lee et al. and showed how to overcome the problems regarding anonymity and backward secrecy. However, in the paper, we will show that Wu et al.'s improved scheme still did not provide user anonymity as they claimed.