2011
DOI: 10.1587/transcom.e94.b.554
|View full text |Cite
|
Sign up to set email alerts
|

Secure Authentication Scheme with Improved Anonymity for Wireless Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Finally, we compare our proposed scheme with previous schemes [3,4,5,6,8,12] in terms of security and show the comparison results in Table 6(`)@. According to Table 6(`)@, there are six major characteristics:…”
Section: Smartcard Loss Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, we compare our proposed scheme with previous schemes [3,4,5,6,8,12] in terms of security and show the comparison results in Table 6(`)@. According to Table 6(`)@, there are six major characteristics:…”
Section: Smartcard Loss Attackmentioning
confidence: 99%
“…It focuses on the situation of smart card breach, even if the adversary extracts the information stored in smart card, he cannot derive the password of the user. In 2011, Lee and Kwon [6] provided the property of untraceability for the user. They used random nonce to make each session requests from a particular user unidentifiable, so the adversary cannot tell if the message is from the same user or not.…”
Section: Introductionmentioning
confidence: 99%
“…Not surprising, roaming authentication schemes are a subject of active computer science research, and examples of roaming authentication schemes for smart cards include those presented in [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. Smart-card-based schemes have attracted the attention of researchers due to their potential to be widely deployed.…”
Section: Introductionmentioning
confidence: 99%