Private-key algebraic-coded cryptosystems
Proceedings on Advances in cryptology---CRYPTO '86
Network security via private-key certificates
ACM SIGOPS Operating Systems Review
On Private-Key Cryptosystems Based on Product Codes
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
On the security of 3GPP networks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
On certificate-based security protocols for wireless mobile communication systems
IEEE Network: The Magazine of Global Internetworking
Anonymous authentication protocol for GSM networks
International Journal of Security and Networks
Anonymous authentication scheme for wireless communications
International Journal of Mobile Communications
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Journal of Parallel and Distributed Computing
Privacy-enhanced fast re-authentication for EAP-based next generation network
Computer Communications
A strong user authentication scheme with smart cards for wireless communications
Computer Communications
New authentication protocol providing user anonymity in open network
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Hi-index | 0.00 |
A method of integrating user authentication with anonymity and untraceability is presented based on the secret-key certificate and the algebraic structure of error-correcting codes. Authentication protocol proposed here provides a means for the authentication server to avoid the requirement of maintaining a secure database of user secrets. Especially, since the proposed protocol uses a symmetric-key cryptography and eliminates the key management problem, it is efficient and convenient for both the hardware-limited users and the authentication server.