Universal authentication protocols for anonymous wireless communications

G Yang, Q Huang, DS Wong… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
protocol allows a roaming user U to visit a foreign server V and establish a session key in an
authenticated … We propose two protocols: one provides better efficiency and supports user …

[PDF][PDF] Anonymous authentication protocols for iot based-healthcare systems: a survey

M Asassfeh, N Obeid, W Almobaideen - International Journal of …, 2020 - academia.edu
authentication in IoT. In section 3 we present a survey of articles on Anonymous Authentication
… In section 4 we present some of prominent security attacks on authentication protocols. In …

[PDF][PDF] Secure anonymous RFID authentication protocols

C Chatmon, T van Le, M Burmester - 2006 - researchgate.net
anonymous RFID authentication protocols and … Anonymous RFID authetication protocols
In this section we propose three RFID authentication protocols, a 2-pass authentication protocol

A practical authentication protocol with anonymity for wireless access networks

YC Chen, SC Chuang, LY Yeh… - … and Mobile Computing, 2011 - Wiley Online Library
… The use of anonymous channel tickets was proposed for authentication in wireless … Recently,
Yang et al. proposed a secure and efficient authentication protocol for anonymous channel …

A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks

P Gope, T Hwang - IEEE Transactions on industrial electronics, 2016 - ieeexplore.ieee.org
… have been made for designing authentication schemes with user … anonymous user
authentication in WSN are impractical. Subsequently, we propose a realistic authentication protocol

A secure, lightweight, and anonymous user authentication protocol for IoT environments

S Son, Y Park, Y Park - Sustainability, 2021 - mdpi.com
… Therefore, we propose an improved authentication protocol that can resolve these issues. …
, and anonymous authentication protocol suitable for IoT environments. The proposed protocol

AnonPri: An efficient anonymous private authentication protocol

ME Hoque, F Rahman… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
… a group based anonymous private authentication protocol (AnonPri… Our protocol provides
unlinkability and thereby preserves … the protocols, AnonPri and the group based authentication. …

An anonymous two-factor authentication protocol for IoT-based applications

MJ Sadri, MR Asaar - Computer Networks, 2021 - Elsevier
authentication protocol for IoT and claimed that their protocol is secure against all known
attacks. We analyze their protocol … Then, we propose a two-factor authentication protocol that is …

Anonymous authentication protocols for vehicular ad hoc networks: An overview

H Xiong, Z Guan, J Hu, Z Chen - Applied Cryptography and …, 2012 - books.google.com
anonymous authentication mechanisms. Even though some sections might point out
vulnerabilities in certain classes of authentication protocols… privacy-preserving protocols for …

E-AUA: An efficient anonymous user authentication protocol for mobile IoT

X Zeng, G Xu, X Zheng, Y Xiang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
… services, malicious attackers can access them in an unauthorized way. In this paper, we
designed an Efficient Anonymous User Authentication (E-AUA) protocol between the users and …