[HTML][HTML] An improved anonymous authentication scheme for roaming in ubiquitous networks

H Lee, D Lee, J Moon, J Jung, D Kang, H Kim, D Won - PLoS One, 2018 - journals.plos.org
With the evolution of communication technology and the exponential increase of mobile
devices, the ubiquitous networking allows people to use our data and computing resources …

[引用][C] An improved anonymous authentication scheme for roaming in ubiquitous networks

H Lee, D Lee, J Moon, J Jung, D Kang, H Kim… - PLoS …, 2018 - ui.adsabs.harvard.edu
An improved anonymous authentication scheme for roaming in ubiquitous networks - NASA/ADS
Now on home page ads icon ads Enable full ADS view NASA/ADS An improved anonymous …

An improved anonymous authentication scheme for roaming in ubiquitous networks

H Lee, D Lee, J Moon, J Jung, D Kong, H Kim… - PLOS …, 2018 - scholarworks.bwise.kr
With the evolution of communication technology and the exponential increase of mobile
devices, the ubiquitous networking allows people to use our data and computing resources …

An improved anonymous authentication scheme for roaming in ubiquitous networks

H Lee, D Lee, J Moon, J Jung, D Kang, H Kim… - PLOS …, 2018 - econpapers.repec.org
With the evolution of communication technology and the exponential increase of mobile
devices, the ubiquitous networking allows people to use our data and computing resources …

An improved anonymous authentication scheme for roaming in ubiquitous networks

H Lee, D Lee, J Moon, J Jung, D Kang, H Kim, D Won - PLoS ONE, 2018 - go.gale.com
The development of communication technology provides efficient services based on
sustainable infrastructures that improve the human quality of life. As smart devices such as …

[PDF][PDF] An improved anonymous authentication scheme for roaming in ubiquitous networks

H Lee, D Lee, J Moon, J Jung, D Kang… - PLoS ONE, 2018 - pdfs.semanticscholar.org
With the evolution of communication technology and the exponential increase of mobile
devices, the ubiquitous networking allows people to use our data and computing resources …

An improved anonymous authentication scheme for roaming in ubiquitous networks.

H Lee, D Lee, J Moon, J Jung, D Kang, H Kim… - PLoS …, 2018 - search.ebscohost.com
With the evolution of communication technology and the exponential increase of mobile
devices, the ubiquitous networking allows people to use our data and computing resources …

An improved anonymous authentication scheme for roaming in ubiquitous networks.

H Lee, D Lee, J Moon, J Jung, D Kang, H Kim, D Won - Plos one, 2018 - europepmc.org
With the evolution of communication technology and the exponential increase of mobile
devices, the ubiquitous networking allows people to use our data and computing resources …

[PDF][PDF] An improved anonymous authentication scheme for roaming in ubiquitous networks

H Lee, D Lee, J Moon, J Jung, D Kang, H Kim - PLoS ONE, 2018 - seclab.skku.edu
With the evolution of communication technology and the exponential increase of mobile
devices, the ubiquitous networking allows people to use our data and computing resources …

An improved anonymous authentication scheme for roaming in ubiquitous networks

H Lee, D Lee, J Moon, J Jung, D Kang, H Kim, D Won - PLOS ONE, 2018 - ideas.repec.org
With the evolution of communication technology and the exponential increase of mobile
devices, the ubiquitous networking allows people to use our data and computing resources …