2005
DOI: 10.1016/j.amc.2004.10.073
|View full text |Cite
|
Sign up to set email alerts
|

A secure and efficient authentication protocol for anonymous channel in wireless communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(15 citation statements)
references
References 10 publications
0
15
0
Order By: Relevance
“…In this subsection, we compared our proposed scheme with other similar works that are intended to ensure anonymous interactions between the users and the service provider [8,29]. In Table 3.…”
Section: Performance Analysismentioning
confidence: 98%
“…In this subsection, we compared our proposed scheme with other similar works that are intended to ensure anonymous interactions between the users and the service provider [8,29]. In Table 3.…”
Section: Performance Analysismentioning
confidence: 98%
“…At first, we idealize the scheme as follows: The initial assumptions, which are quite standard, are as follows: According to assumption (12) and the freshness conjun-…”
Section: Authentication Proof Based On Burrows-abadi-needham Logicmentioning
confidence: 99%
“…In 2005, Yang et al . proposed a secure and efficient scheme to achieve user anonymity by using symmetric cryptosystems over an anonymous channel in a wireless network. However, Chen et al .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, a number of protocols have been proposed for the value added services in Vehicular Ad-hoc Networks (VANET) [12], [13], [14], public-private key-based vehicular communication system [15], [16], [17], and digital signatures in batch to achieve high efficiency [18], [19]. Several SMS-based wireless protocols [20], [21], [22], [23], lightweight AKA [7] and SMS-based attacks and their countermeasures are discussed in [8]. Also, the protocols in [24], [25], [26], [27] are designed to provide SMS security based on asymmetric key cryptography with the exception in [26].…”
Section: Existing Solutionsmentioning
confidence: 99%