An improved anonymous authentication scheme for roaming in ubiquitous networks

H Lee, D Lee, J Moon, J Jung, D Kang, H Kim, D Won - PLoS One, 2018 - journals.plos.org
With the evolution of communication technology and the exponential increase of mobile
devices, the ubiquitous networking allows people to use our data and computing resources …

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks

M Karuppiah, S Kumari, AK Das, X Li… - Security and …, 2016 - Wiley Online Library
Ubiquitous networks provide effective roaming services for mobile users (MUs). Through the
worldwide roaming technology, authorized MUs can avail ubiquitous network services …

A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks

M Karuppiah, S Kumari, X Li, F Wu, AK Das… - Wireless Personal …, 2017 - Springer
User authentication scheme is an essential issue for offering roaming service to mobile
users in global mobile network (GLOMONET). However, designing an anonymous user …

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security

MS Farash, SA Chaudhry, M Heydari… - International Journal …, 2017 - Wiley Online Library
Ubiquitous networks provide roaming service for mobile nodes enabling them to use the
services extended by their home networks in a foreign network. A mutual authentication …

A secure anonymous authentication protocol for roaming service in resource-constrained mobility environments

R Madhusudhan, R Shashidhara - Arabian Journal for Science and …, 2020 - Springer
Mobile user authentication is very crucial to ensure the authenticity and privacy of roaming
users in mobility environments. The existing communication technologies are highly …

BIAS: A novel secure and efficient biometric-based anonymous authentication scheme

Q Zhu, L You, GR Hu, WN Liu - Computer Networks, 2024 - Elsevier
Currently, biometric-based authentication schemes are widely adopted in the field of online
payments. Consequently, this has led to an increasing number of people becoming …

An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks

S Shin, H Yeh, K Kim - Peer-to-peer Networking and Applications, 2015 - Springer
Recently the advances in a variety of hardware/software technologies and wireless
networking have brought explosive growth of mobile network/device involved services and it …

An efficient and secure anonymous mobility network authentication scheme

WC Kuo, HJ Wei, JC Cheng - journal of information security and …, 2014 - Elsevier
The demands of Internet users are steadily increasing. Many users access Internet services
through mobile devices via wireless networks. To prevent disclosure of private data …

A practical anonymous authentication protocol for wireless roaming

Q Xie, X Tan, DS Wong, G Wang… - Security and …, 2014 - Wiley Online Library
Recently, Chen et al. proposed a practical authentication protocol for supporting anonymous
roaming in wireless access networks, then the protocol is further improved by Hsieh and …

A robust user authentication protocol with privacy-preserving for roaming service in mobility environments

R Shashidhara, S Bojjagani, AK Maurya… - Peer-to-peer networking …, 2020 - Springer
The authentication system plays a crucial role in the context of GLObal MObility NETwork
(GLOMONET) where Mobile User (MU) often need to seamless and secure roaming service …