The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Selepas skim pengesahan tanpa nama Zhu dan Ma, beberapa kajian telah memfokuskan pada meningkatkan keselamatannya dalam persekitaran mudah alih tanpa wayar. Malangnya, mereka tidak dapat memberikan kebolehkesanan, salah satu ciri kritikal tanpa nama. Dalam kertas ini, kami menunjukkan kebimbangan keselamatan kajian terdahulu dan mencadangkan skim pengesahan baru dengan ketidakbolehkesanan yang lebih baik.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
JongHyup LEE, Taekyoung KWON, "Secure Authentication Scheme with Improved Anonymity for Wireless Environments" in IEICE TRANSACTIONS on Communications,
vol. E94-B, no. 2, pp. 554-557, February 2011, doi: 10.1587/transcom.E94.B.554.
Abstract: After the anonymity authentication scheme of Zhu and Ma, several studies have focused on improving its security in wireless mobile environments. Unfortunately, they could not provide untraceability, one of the critical features in anonymity. In this paper, we point out the security concerns of previous studies and propose a novel authentication scheme with improved untraceability.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E94.B.554/_p
Salinan
@ARTICLE{e94-b_2_554,
author={JongHyup LEE, Taekyoung KWON, },
journal={IEICE TRANSACTIONS on Communications},
title={Secure Authentication Scheme with Improved Anonymity for Wireless Environments},
year={2011},
volume={E94-B},
number={2},
pages={554-557},
abstract={After the anonymity authentication scheme of Zhu and Ma, several studies have focused on improving its security in wireless mobile environments. Unfortunately, they could not provide untraceability, one of the critical features in anonymity. In this paper, we point out the security concerns of previous studies and propose a novel authentication scheme with improved untraceability.},
keywords={},
doi={10.1587/transcom.E94.B.554},
ISSN={1745-1345},
month={February},}
Salinan
TY - JOUR
TI - Secure Authentication Scheme with Improved Anonymity for Wireless Environments
T2 - IEICE TRANSACTIONS on Communications
SP - 554
EP - 557
AU - JongHyup LEE
AU - Taekyoung KWON
PY - 2011
DO - 10.1587/transcom.E94.B.554
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E94-B
IS - 2
JA - IEICE TRANSACTIONS on Communications
Y1 - February 2011
AB - After the anonymity authentication scheme of Zhu and Ma, several studies have focused on improving its security in wireless mobile environments. Unfortunately, they could not provide untraceability, one of the critical features in anonymity. In this paper, we point out the security concerns of previous studies and propose a novel authentication scheme with improved untraceability.
ER -