2015
DOI: 10.1504/ijes.2015.072374
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight handover authentication with location privacy-preserving in mobile wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…• Security analysis: Most of the existing ciphering protocols [26][27][28] presented previously are susceptible to various security perils as seen after informal security analysis. To eliminate all the possibilities of considering any existing security breaches, we have proposed the ElGamal ciphering ID shifting for secure data communication during conversation with third party.…”
Section: Contributionmentioning
confidence: 99%
See 3 more Smart Citations
“…• Security analysis: Most of the existing ciphering protocols [26][27][28] presented previously are susceptible to various security perils as seen after informal security analysis. To eliminate all the possibilities of considering any existing security breaches, we have proposed the ElGamal ciphering ID shifting for secure data communication during conversation with third party.…”
Section: Contributionmentioning
confidence: 99%
“…Here, the auditor who knows the ID of cloud end‐user is said to as the third party key auditor. End‐users who use a public key need to verify the authenticity of that public key 26 . As a result, the data transmission and computational overhead of cloud end‐user are extremely high.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…At the same time, He et al [14] did some improvement to enhance He et al 's protocol [9]. Note that He et al [15] and Liu et al [16] independently presented two efficient handover authentication protocols without involving bilinear paring and map-to-point operation.…”
Section: Related Workmentioning
confidence: 99%