A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Third Generation Mobile Communication Systems
Third Generation Mobile Communication Systems
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
A new method for using hash functions to solve remote user authentication
Computers and Electrical Engineering
Efficient, anonymous, and authenticated conference key setup in cellular wireless networks
Computers and Electrical Engineering
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
A self-verification authentication mechanism for mobile satellite communication systems
Computers and Electrical Engineering
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
Identity-based mix: Anonymous communications without public key certificates
Computers and Electrical Engineering
An on-line electronic check system with mutual authentication
Computers and Electrical Engineering
Enhancing WLAN/UMTS dual-mode services using a novel distributed multi-agent scheduling scheme
Computers and Electrical Engineering
Security flaw of authentication scheme with anonymity for wireless communications
IEEE Communications Letters
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
A network-based mobility management scheme for future Internet
Computers and Electrical Engineering
An efficient anonymous authentication mechanism for delay tolerant networks
Computers and Electrical Engineering
A strong user authentication scheme with smart cards for wireless communications
Computer Communications
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
An improved dynamic ID-based remote user authentication with key agreement scheme
Computers and Electrical Engineering
Cryptanalysis of the user authentication scheme with anonymity
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme
International Journal of Communication Systems
A secure user-friendly authentication scheme with anonymity for wireless communications
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Performance analysis of multivariate cryptosystem schemes for wireless sensor network
Computers and Electrical Engineering
Hi-index | 0.00 |
Secure user authentication is an important issue for wireless environment such as GSM, CDPD, and 3G and 4G wireless systems. Especially, anonymity of the mobile users should be guaranteed to protect the privacy of the mobile users. This paper proposes a user friendly authentication scheme with anonymity for wireless communications that not only can overcome the weaknesses of the previous related schemes, but also can provide efficiency and security to suitable for battery-powered mobile devices in wireless communication systems.