2009
DOI: 10.1016/j.comcom.2008.11.032
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced authentication scheme with anonymity for roaming service in global mobility networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
144
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 152 publications
(144 citation statements)
references
References 16 publications
0
144
0
Order By: Relevance
“…In 2006, Lee et al [7] proposed an enhancement to improve Zhu and Ma's authentication scheme for wireless networks. In 2009, Chang et al [8] analyzed Lee et al's scheme [7] and pointed out that Lee et al's scheme still suffers from forgery attack and also proposed an improvement. In 2014, Kuo et al [9] showed that Chang et al's scheme cannot ensure anonymity for mobile users and proposed an improvement.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2006, Lee et al [7] proposed an enhancement to improve Zhu and Ma's authentication scheme for wireless networks. In 2009, Chang et al [8] analyzed Lee et al's scheme [7] and pointed out that Lee et al's scheme still suffers from forgery attack and also proposed an improvement. In 2014, Kuo et al [9] showed that Chang et al's scheme cannot ensure anonymity for mobile users and proposed an improvement.…”
Section: Introductionmentioning
confidence: 99%
“…To ensure security of mobility networks, many authentication protocols are proposed [1][2][3][4][5][6][7][8][9][10]. In 2004, Zhu and Ma proposed an authentication scheme with anonymity for wireless environments based on the hash function and smart cards [5].…”
Section: Introductionmentioning
confidence: 99%
“…However, in [3], it was shown that the Zhu et al's scheme and Lee and et al's scheme fails to provide user anonymity, and Wu, Lee and Tsaur proposed an enhanced scheme by providing an effective remedy. Independently, in [4], Chang et al showed that Lee et al's scheme cannot provide user anonymity under the forgery attack and also proposed an enhanced authentication scheme. Unfortunately, Youn et al found that the scheme of [4] fails to achieve user anonymity under four attack strategies [5].…”
Section: Introductionmentioning
confidence: 99%
“…Independently, in [4], Chang et al showed that Lee et al's scheme cannot provide user anonymity under the forgery attack and also proposed an enhanced authentication scheme. Unfortunately, Youn et al found that the scheme of [4] fails to achieve user anonymity under four attack strategies [5]. Thereafter, He et al proposed an improved scheme [6] based on the concept of pseudonym.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation