Lightweight anonymous authentication scheme with unlinkability in global mobility networks

Y Chung, S Choi, D Won - JoC, 2013 - earticle.net
Anonymous user authentication schemes are essential to guarantee personal privacy in
global mobility networks. Recently, Chung, Lee and Won proposed an improved …

Jamming resistant non‐interactive anonymous and unlinkable authentication scheme for mobile satellite networks

MH Ibrahim, S Kumari, AK Das… - Security and …, 2016 - Wiley Online Library
Most of the previously proposed schemes use temporary identities for mobile users to
provide unlinkable anonymous authentication for mobile users to the satellite network …

A lightweight authentication scheme based on self‐updating strategy for space information network

Y Liu, A Zhang, S Li, J Tang, J Li - International Journal of …, 2017 - Wiley Online Library
The security of space information network (SIN) is getting more and more important now.
Because of the special features of SIN (eg, the dynamic and unstable topology, the highly …

An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications

S Jegadeesan, M Azees, PM Kumar… - Sustainable Cities and …, 2019 - Elsevier
Nowadays, the number of mobile users has considerably increased in recent years. The
users can utilize several cloud computing services through their mobile devices during their …

Lattice-based key agreement protocol under ring-LWE problem for IoT-enabled smart devices

S Rana, D Mishra - Sādhanā, 2021 - Springer
Advances in communication technologies along with the availability of Internet and Internet
of Things (IoT) devices enable users to acquire various services over the Internet. However …

A lightweight and secure authentication protocol for space-ground integrated network of railway

Y Wang, W Zhang, X Wang - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
It is one of the important aspects of the future railway dedicated wireless communication
system to realize the full wireless coverage when the train passes through different …

Efficient password-authenticated key exchange from RLWE based on asymmetric key consensus

Y Yang, X Gu, B Wang, T Xu - International Conference on Information …, 2019 - Springer
A password-authenticated key exchange (PAKE) protocol allows two entities sharing a
password to perform mutual authentication and establish a session key. Benefiting from the …

A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks

M Karuppiah, S Kumari, X Li, F Wu, AK Das… - Wireless Personal …, 2017 - Springer
User authentication scheme is an essential issue for offering roaming service to mobile
users in global mobile network (GLOMONET). However, designing an anonymous user …

A Secure and Privacy‐Preserving Three‐Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things

Q Xie, Z Ding, B Hu - Security and communication networks, 2021 - Wiley Online Library
The Internet of things is playing more and more important role in smart healthcare, smart
grids, and smart transportation, and using wireless sensor network (WSN), we can easily …

A secure and efficient access and handover authentication protocol for Internet of Things in space information networks

K Xue, W Meng, S Li, DSL Wei… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Space information network (SIN) makes it possible for any object to be connected to the
Internet anywhere, even in the areas with extreme conditions, where a cellular network is not …