W Jeon, Y Lee, D Won - International Journal of Security and Its …, 2013 - earticle.net
Since 2004, several user authentication schemes purpose to provide user anonymity in wireless communication have been announced, however, many of them failed to provide …
An authenticated key distribution scheme preserving user anonymity is important to those e- commerce applications where user anonymity is required or desirable. However, the …
Several remote user authentication techniques for telecare medicine information system (TMIS) have been proposed in the literature. But most existing techniques have limitations …
The rapid increase in user base and technological penetration has enabled the use of a wide range of devices and applications. The services are rendered to these devices from …
W Jeon, J Kim, Y Lee, D Won - … , Secure and Trust Computing, and Data …, 2012 - Springer
Recently, with the growth of the smartphone, wireless communi-cations using mobile device are growing rapidly around the world. The most advantage of the wireless communication is …
D He, M Ma, Y Zhang, C Chen, J Bu - Computer Communications, 2011 - Elsevier
Seamless roaming over wireless network is highly desirable to mobile users, and security such as authentication of mobile users is challenging. Recently, due to tamper-resistance …
B Hu, M BAO, NA DONG - Kuwait Journal of Science, 2014 - journalskuwait.org
To design a mobile user authentication protocol with anonymity for the global mobile network is a challenge, since wireless network is more vulnerable to attacks and mobile …
J Niu, X Li - Security and Communication Networks, 2014 - Wiley Online Library
User authentication and privacy protection are important issues for wireless and mobile communication systems such as GSM, 3G, and 4G wireless networks. Recently, Yoon et al …
Y Jiang, Y Zhu, J Wang, Y Xiang - Journal of Parallel and Distributed …, 2020 - Elsevier
To preserve user privacy and guarantee data confidentiality on the mobile Internet, it is crucial to secure communication between the mobile devices held by users and a remote …