2013
DOI: 10.1007/s12083-013-0218-2
|View full text |Cite
|
Sign up to set email alerts
|

An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(39 citation statements)
references
References 16 publications
0
38
0
Order By: Relevance
“…As the cost of XOR operation and module addition are rather cheap, these two operations are not included in the comparison, and only symmetric encryption/decryption operation, chaotic map operation, hash operation and modular exponential operation are evaluated. As shown in TABLE III, the computational cost of client in [9,10,13] is much cheap than PPRAS, however, as discussed previously, the scheme in Chongqing Research Program of Application Foundation and Advanced Technology (no. cstc-2014jcyjA40028, no.…”
Section: G1mentioning
confidence: 98%
See 3 more Smart Citations
“…As the cost of XOR operation and module addition are rather cheap, these two operations are not included in the comparison, and only symmetric encryption/decryption operation, chaotic map operation, hash operation and modular exponential operation are evaluated. As shown in TABLE III, the computational cost of client in [9,10,13] is much cheap than PPRAS, however, as discussed previously, the scheme in Chongqing Research Program of Application Foundation and Advanced Technology (no. cstc-2014jcyjA40028, no.…”
Section: G1mentioning
confidence: 98%
“…FA believes that HA has verified MU's anonymous identity SID. [9,12] cannot resist to the man-in-the-middle attacks, and the scheme in [10] cannot preserve the user's privacy. However, the efficiency of [11] is not desirable.…”
Section: ) Goalsmentioning
confidence: 99%
See 2 more Smart Citations
“…And they proposed an enhanced and secure mutual authentication key agreement scheme preserving user anonymity. Meanwhile, He et al's scheme was also proved vulnerable to insider attack and does not provide session key secrecy and password update secrecy by Shin et al [18]. And Shin et al proposed an improved authentication scheme.…”
Section: Previous Workmentioning
confidence: 99%