2010
DOI: 10.1109/twc.2010.01.081219
|View full text |Cite
|
Sign up to set email alerts
|

Universal authentication protocols for anonymous wireless communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
119
0
3

Year Published

2012
2012
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 112 publications
(132 citation statements)
references
References 15 publications
0
119
0
3
Order By: Relevance
“…The limitations of SC-based schemes have greatly stimulated the research of AC-based schemes [24], [25], [39], [40], [41], [42], because AC-based schemes can provide more security, stronger privacy preservation, and require fewer communication rounds. These advantages have led to the recent increasing popularity of the AC-based secure roaming schemes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The limitations of SC-based schemes have greatly stimulated the research of AC-based schemes [24], [25], [39], [40], [41], [42], because AC-based schemes can provide more security, stronger privacy preservation, and require fewer communication rounds. These advantages have led to the recent increasing popularity of the AC-based secure roaming schemes.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, there may be a large number of mobile users that need to be revoked in the network anytime due to various reasons, e.g., when any illegal or exceptional events occur. However, the existing secure roaming schemes [24], [25] do not support this function. This will significantly increase the burden of the home authentication server and potentially reduce the efficiency of the whole network.…”
mentioning
confidence: 99%
“…Observe that this technology that would be change the world ever since 2003 [1]. In the reference [2] we observe that the various applications of WSNs divided into three types. Those are monitoring the space, monitoring the relations of the things and monitoring things with each other and surrounding space.…”
Section: Introductionmentioning
confidence: 99%
“…In my scheme has lower computational cost or overhead than CDPA and it is more secure. If some packet is not loss this scheme is very useful or efficient without publish any private information [2].…”
Section: Introductionmentioning
confidence: 99%
“…Further, as mentioned above, VLR needs to on-line contact with HLR when the roaming starting that may have a high overhead in communication. In 2010, Yang et al proposed a new model to achieve universal authentication in roaming by using group signatures [7]. Afterwards, He et al pointed out the problem of privacy-preserving and proposed an improved one [6].…”
Section: Introductionmentioning
confidence: 99%