The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Após o esquema de autenticação anônima de Zhu e Ma, vários estudos têm se concentrado em melhorar sua segurança em ambientes móveis sem fio. Infelizmente, eles não puderam fornecer a rastreabilidade, uma das características críticas do anonimato. Neste artigo, apontamos as preocupações de segurança de estudos anteriores e propomos um novo esquema de autenticação com melhor rastreabilidade.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
JongHyup LEE, Taekyoung KWON, "Secure Authentication Scheme with Improved Anonymity for Wireless Environments" in IEICE TRANSACTIONS on Communications,
vol. E94-B, no. 2, pp. 554-557, February 2011, doi: 10.1587/transcom.E94.B.554.
Abstract: After the anonymity authentication scheme of Zhu and Ma, several studies have focused on improving its security in wireless mobile environments. Unfortunately, they could not provide untraceability, one of the critical features in anonymity. In this paper, we point out the security concerns of previous studies and propose a novel authentication scheme with improved untraceability.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E94.B.554/_p
Copiar
@ARTICLE{e94-b_2_554,
author={JongHyup LEE, Taekyoung KWON, },
journal={IEICE TRANSACTIONS on Communications},
title={Secure Authentication Scheme with Improved Anonymity for Wireless Environments},
year={2011},
volume={E94-B},
number={2},
pages={554-557},
abstract={After the anonymity authentication scheme of Zhu and Ma, several studies have focused on improving its security in wireless mobile environments. Unfortunately, they could not provide untraceability, one of the critical features in anonymity. In this paper, we point out the security concerns of previous studies and propose a novel authentication scheme with improved untraceability.},
keywords={},
doi={10.1587/transcom.E94.B.554},
ISSN={1745-1345},
month={February},}
Copiar
TY - JOUR
TI - Secure Authentication Scheme with Improved Anonymity for Wireless Environments
T2 - IEICE TRANSACTIONS on Communications
SP - 554
EP - 557
AU - JongHyup LEE
AU - Taekyoung KWON
PY - 2011
DO - 10.1587/transcom.E94.B.554
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E94-B
IS - 2
JA - IEICE TRANSACTIONS on Communications
Y1 - February 2011
AB - After the anonymity authentication scheme of Zhu and Ma, several studies have focused on improving its security in wireless mobile environments. Unfortunately, they could not provide untraceability, one of the critical features in anonymity. In this paper, we point out the security concerns of previous studies and propose a novel authentication scheme with improved untraceability.
ER -