[PDF][PDF] Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications.

J Hu, H Xiong, Z Chen - Int. J. Netw. Secur., 2012 - ijns.jalaxy.com.tw
Seamless roaming is highly desirable for wireless communications, and security such as
authentication and privacy preserving of mobile users is challenging. Recently, Wu et al. and …

A practical anonymous authentication protocol for wireless roaming

Q Xie, X Tan, DS Wong, G Wang… - Security and …, 2014 - Wiley Online Library
Recently, Chen et al. proposed a practical authentication protocol for supporting anonymous
roaming in wireless access networks, then the protocol is further improved by Hsieh and …

An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks

R Madhusudhan, Shashidhara - … of the 6th international conference on …, 2016 - dl.acm.org
In global mobile network, it is essential to authenticate mobile users and provide secure
communication between a user, foreign agent and the home agent using session key …

Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks

TY Youn, YH Park, J Lim - IEEE Communications Letters, 2009 - ieeexplore.ieee.org
Recently, Chang, Lee, and Chiu proposed an enhanced anonymous authentication scheme
which permits mobile users to anonymously enjoy roaming service in global mobile …

Enhanced authentication scheme with anonymity for roaming service in global mobility networks

CC Chang, CY Lee, YC Chiu - Computer Communications, 2009 - Elsevier
User authentication is an important security mechanism for recognizing legal roaming users.
In 2006, Lee, Hwang, and Liao proposed an enhanced authentication scheme with user …

A secure anonymity preserving authentication scheme for roaming service in global mobility networks

V Odelu, S Banerjee, AK Das, S Chattopadhyay… - Wireless Personal …, 2017 - Springer
In real-life applications, ensuring secure transmission of data over public network channels
to prevent malicious eavesdropping of the data is an important issue. Several potential …

A lightweight roaming authentication protocol for anonymous wireless communication

X Li, Y Zhang, X Liu, J Cao… - 2012 IEEE global …, 2012 - ieeexplore.ieee.org
In wireless network, a secure roaming authentication protocol enables a mobile user to get
services from a foreign server when he/she is outside of the home server. However, the …

Advanced secure anonymous authentication scheme for roaming service in global mobility networks

CC Lee, YM Lai, CT Chen, SD Chen - Wireless Personal Communications, 2017 - Springer
Recently, user authentication schemes for mobile devices have become increasingly critical.
Because of wide use, numerous services for mobile devices are provided, and will continue …

Privacy-preserving universal authentication protocol for wireless communications

D He, J Bu, S Chan, C Chen… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Seamless roaming over wireless networks is highly desirable to mobile users, and security
such as authentication of mobile users is challenging. In this paper, we propose a privacy …

A new roaming authentication framework for wireless communication

X Li, Y Zhang, X Liu, J Cao, Q Zhao - KSII Transactions on Internet …, 2013 - koreascience.kr
Roaming authentication protocol is widely used in wireless network which can enable a
seamless service for the mobile users. However, the classical approach requires the home …