4.4 Article

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks

Mohammad Sabzinejad Farash et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2015)

Article Health Care Sciences & Services

Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems

Shehzad Ashraf Chaudhry et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Computer Science, Information Systems

An enhanced privacy preserving remote user authentication scheme with provable security

Shehzad Ashraf Chaudhry et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Information Systems

Cryptanalysis and improvement of 'an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks'

Mohammad Sabzinejad Farash

INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT (2015)

Article Computer Science, Information Systems

A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card

Azeem Irshad et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Article Computer Science, Information Systems

An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks

Soobok Shin et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Article Automation & Control Systems

An Enhanced and Secure Three-party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems

Mohammad Sabzinejad Farash et al.

INFORMATION TECHNOLOGY AND CONTROL (2014)

Article Computer Science, Hardware & Architecture

An efficient client-client password-based authentication scheme with provable security

Mohammad Sabzinejad Farash et al.

JOURNAL OF SUPERCOMPUTING (2014)

Article Engineering, Mechanical

Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing

Mohammad Sabzinejad Farash et al.

NONLINEAR DYNAMICS (2014)

Article Computer Science, Information Systems

A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme

Azeem Irshad et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Article Computer Science, Information Systems

More secure smart card-based remote user password authentication scheme with user anonymity

Saru Kumari et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Article Telecommunications

Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network

Qi Xie et al.

WIRELESS PERSONAL COMMUNICATIONS (2014)

Article Telecommunications

An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks

Qi Jiang et al.

WIRELESS PERSONAL COMMUNICATIONS (2013)

Article Telecommunications

A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks

Fengtong Wen et al.

WIRELESS PERSONAL COMMUNICATIONS (2013)

Article Computer Science, Interdisciplinary Applications

A novel user authentication and privacy preserving scheme with smart cards for wireless communications

Chun-Ta Li et al.

MATHEMATICAL AND COMPUTER MODELLING (2012)

Article Computer Science, Interdisciplinary Applications

Enhanced secure anonymous authentication scheme for roaming service in global mobility networks

Hyeran Mun et al.

MATHEMATICAL AND COMPUTER MODELLING (2012)

Article Engineering, Electrical & Electronic

Lightweight and provably secure user authentication with anonymity for the global mobility network

Chun Chen et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2011)

Article Computer Science, Information Systems

A practical authentication protocol with anonymity for wireless access networks

Yen-Cheng Chen et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2011)

Article Computer Science, Information Systems

Enhanced authentication scheme with anonymity for roaming service in global mobility networks

Chin-Chen Chang et al.

COMPUTER COMMUNICATIONS (2009)

Article Telecommunications

A Secure Authentication Scheme with Anonymity for Wireless Communications

Chia-Chun Wu et al.

IEEE COMMUNICATIONS LETTERS (2008)

Article Automation & Control Systems

Security enhancement on a new authentication scheme with anonymity for wireless environments

Cheng-Chi Lee et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2006)