2012
DOI: 10.4304/jnw.7.9.1341-1348
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Anonymous Authentication Scheme for Trusted Network Connection in Mobile Environment

Abstract: Technologies make the mobile terminals such as smart phones, PDAs and handsets much more powerful to access mobile network in recent years. Especially with the widely use of mobile terminals, mobile network now becomes a primary tool for daily and business interactions. However, the proliferation of mobile terminals also draws mobile malware’s attention which will do damage to the mobile terminal and further affect the security of mobile network. But the traditional access control and authentication mech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 12 publications
0
1
0
Order By: Relevance
“…Combining digital watermarking with digital signature, a signature authentication method for the time information, motion feature and DCT coefficient of MPEG videos was proposed [4].In order to assure a trusted cloud infrastructure to customers, the multi-tenancy trusted computing environment model was designed [5]. An image authentication using sliding window and hierarchical structure technology was proposed, which is based on SHA512 and hash function for knapsack problem [6]. A multi-domain reliable grid model of identity-sensitive and P2P distributed authentication technology were separately proposed based on PKI [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…Combining digital watermarking with digital signature, a signature authentication method for the time information, motion feature and DCT coefficient of MPEG videos was proposed [4].In order to assure a trusted cloud infrastructure to customers, the multi-tenancy trusted computing environment model was designed [5]. An image authentication using sliding window and hierarchical structure technology was proposed, which is based on SHA512 and hash function for knapsack problem [6]. A multi-domain reliable grid model of identity-sensitive and P2P distributed authentication technology were separately proposed based on PKI [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…However, it also brings serious security problems while provides convenience. In the wireless network communication, the datas transferred by kinds of wireless power terminals through wireless channel are easily attacked by such means as monitoring and stealing [1] .…”
Section: Introductionmentioning
confidence: 99%