Security enhancement on a new authentication scheme with anonymity for wireless environments

CC Lee, MS Hwang, IE Liao - IEEE Transactions on Industrial …, 2006 - ieeexplore.ieee.org
In a paper recently published in the IEEE Transactions on Consumer Electronics, Zhu and
Ma proposed a new authentication scheme with anonymity for wireless environments …

A secure authentication scheme with anonymity for wireless communications

CC Wu, WB Lee, WJ Tsaur - IEEE Communications Letters, 2008 - ieeexplore.ieee.org
Recently, a new authentication scheme with anonymity for wireless communications has
been proposed, and then some security problems have been demonstrated. In this paper …

A new authentication scheme with anonymity for wireless environments

J Zhu, J Ma - IEEE Transactions on Consumer Electronics, 2004 - ieeexplore.ieee.org
Wireless network is susceptible to security attacks because its openness of transmission
media. Wireless network security is somewhat more concentrated and complex than that of …

An efficient ticket based authentication protocol with unlinkability for wireless access networks

Q Jiang, J Ma, G Li, L Yang - Wireless personal communications, 2014 - Springer
The concept of anonymous channel ticket is one of the effective measures to protect user
privacy and to reduce the overhead of re-authentication for wireless environments. Most …

A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing

Y Li, Q Cheng, X Liu, X Li - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Mobile edge computing (MEC) provides computing and data storage capabilities within the
range of the wireless access network close to the users, which is driving the need for new …

Anonymous authentication scheme for smart home environment with provable security

M Shuai, N Yu, H Wang, L Xiong - Computers & Security, 2019 - Elsevier
Smart home is an emerging paradigm of the Internet of Things (IoT), which facilitates an
individual to operate the smart home appliances remotely through the internet. Since the …

Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks

P Gope, J Lee, TQS Quek - IEEE Sensors journal, 2016 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) include spatially allotted autonomous instruments that
employ sensors to check environmental or physical conditions. These autonomous …

A novel privacy preserving authentication and access control scheme for pervasive computing environments

K Ren, W Lou, K Kim, R Deng - IEEE Transactions on Vehicular …, 2006 - ieeexplore.ieee.org
Privacy and security are two important but seemingly contradictory objectives in a pervasive
computing environment (PCE). On one hand, service providers want to authenticate …

[HTML][HTML] Enhanced secure anonymous authentication scheme for roaming service in global mobility networks

H Mun, K Han, YS Lee, CY Yeun, HH Choi - Mathematical and Computer …, 2012 - Elsevier
User authentication scheme is an important issue for providing secure roaming service to
users of mobile devices. In 2008, Wu, Lee and Tsaur proposed an enhanced anonymous …

Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme

I Memon, I Hussain, R Akhtar, G Chen - Wireless Personal …, 2015 - Springer
Past few years, the mobile technology and location based services have experienced a
great increment in number of its users. The privacy issues related to these services are …