2012
DOI: 10.1007/978-3-642-34601-9_14
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 23 publications
0
14
0
Order By: Relevance
“…To address the above challenges, the efficiency of the three-party approach has been improved by the two-party protocols proposed later [6][7][8][9][10][11][12][13] in which the need to communicate with AS is completely eliminated. In [6], Yang et al present universal authentication protocols to preserve user anonymity against both eavesdroppers and APs.…”
Section: Existing Protocolsmentioning
confidence: 99%
See 4 more Smart Citations
“…To address the above challenges, the efficiency of the three-party approach has been improved by the two-party protocols proposed later [6][7][8][9][10][11][12][13] in which the need to communicate with AS is completely eliminated. In [6], Yang et al present universal authentication protocols to preserve user anonymity against both eavesdroppers and APs.…”
Section: Existing Protocolsmentioning
confidence: 99%
“…As reported in [3][4][5][6][7][8][9][10][11][12][13], a secure and efficient handover authentication should satisfy the following nine properties: • Subscription validation: An AP must authenticate MNs to ensure their legitimacy. • Server authentication: An MN is sure about the identity of the visited AP.…”
Section: Requirementsmentioning
confidence: 99%
See 3 more Smart Citations