2004
DOI: 10.1109/tc.2004.70
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous wireless authentication on a portable cellular mobile system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(1 citation statement)
references
References 29 publications
0
1
0
Order By: Relevance
“…Wang applied identity-based authentication to portable mobile cellular networks to provide secure and anonymous conference calls [18]. Based on an identity-based hierarchical model for cloud computing (IBHMCC) and corresponding encryption and signature schemes, Li designed a new cloud computing and service authentication protocol, which reduced the burden on the user side compared with SAP (SSL Authentication Protocol) [19].…”
Section: Identity-based Authenticationmentioning
confidence: 99%
“…Wang applied identity-based authentication to portable mobile cellular networks to provide secure and anonymous conference calls [18]. Based on an identity-based hierarchical model for cloud computing (IBHMCC) and corresponding encryption and signature schemes, Li designed a new cloud computing and service authentication protocol, which reduced the burden on the user side compared with SAP (SSL Authentication Protocol) [19].…”
Section: Identity-based Authenticationmentioning
confidence: 99%