ACM Transactions on Computer Systems (TOCS)
One way hash functions and DES
CRYPTO '89 Proceedings on Advances in cryptology
Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Password authentication with insecure communication
Communications of the ACM
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
A simple and efficient conference scheme for mobile communications
WISA'05 Proceedings of the 6th international conference on Information Security Applications
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
Efficient multi-server password authenticated key agreement using smart cards
IEEE Transactions on Consumer Electronics
New remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Key challenges in communication for ubiquitous computing
IEEE Communications Magazine - Part Anniversary
Robust and efficient authenticated key agreement in mobile communications
International Journal of Mobile Communications
A simple and efficient key exchange scheme against the smart card loss problem
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Provably secure and efficient identification and key agreement protocol with user anonymity
Journal of Computer and System Sciences
Hi-index | 0.00 |
In ubiquitous computing, many computers serve each person at any time and any place. These computers could be thin servers and only have low computation and communication capacity. In this paper, we propose a novel user authentication and key agreement scheme suitable for ubiquitous computing environments. The main merits include: (1) there are many security domains which have their own security controllers, and each security domain can be formed dynamically; (2) a user only has to register in a security controller once, and can use all permitted services in this environment; (3) a user can freely choose his own password to protect his secret token; (4) the computation and communication cost is very low; (5) servers and users can authenticate each other; (6) it generates a session key agreed by the server and the user; (7) our proposed scheme is a nonce-based scheme which does not have a serious time-synchronization problem.