Citation: | JIANG Chunlin, JIA Weijia, GU Ke, et al., “Anonymous Authentication without Home Server in Mobile Roaming Networks,” Chinese Journal of Electronics, vol. 22, no. 2, pp. 382-386, 2013, |
T. Zhou, J. Xu, "Provable secure authentication protocol with anonymity for roaming service in global mobility networks", Computer Networks, Vol.55, No.1, pp.205-213, 2011.
|
C. Tang, D.O. Wu, "Mobile privacy in wireless networksrevisited", IEEE Transactions on Wireless Communications, Vol.7, No.3, pp.1035-1042, 2008.
|
W.B. Lee, C.K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems", IEEE Transactions on Wireless Communications, Vol.4, No.1, pp.57- 64, 2005.
|
C.S. Wan, A.Q. Hu, J. Zhang, "An elliptic curve based handoff authentication protocol for WLAN", Acta Electronica Sinica, Vol.39, No.1, pp.165-169, 2011. (in Chinese)
|
K. Shum, V.K. Wei, "A strong proxy signature scheme with proxy signer privacy protection", Proc. of WETICE, Pittsburgh, Pennsylvania, USA, pp.55-56, 2002.
|
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, M. Meyerovich, "How to win the clonewars: efficient periodic n-times anonymous authentication", Proc. of ACM Conference on Computer and Communications Security, Alexandria, VA, USA, pp.201-210, 2006.
|
G.M. Yang, Q. Huang, D.S. Wong, X.T. Deng, "Universal authentication protocols for anonymous wireless communications", IEEE Transactions on Wireless Communications, Vol.9, No.1, pp.168-174, 2010.
|
R. Canetti, H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels (Full Version)", http://eprint.iacr.org/2001, 2001.
|
M. Bellare, R. Canetti, H. Krawczyk, "A modular approach to the design and analysis of authentication and key exchange protocols", Proc. of ACM Symposium on Theory of Computing, Dallas, Texas, USA, pp.419-428, 1998.
|
D. Johnson, A. Menezes, S.A. Vanstone, "The Elliptic curve digital signature algorithm (ECDSA)", International Journal of Information Security, Vol.1, No.1, pp.36-63, 2001.
|
D. Boneh, H. Shacham, "Group signatures with verifier-local revocation", Proc. of ACM Conference on Computer and Communications Security, Washington, DC, USA, pp.168-177, 2004.
|
K. Lauter, "The advantages of elliptic curve cryptography for wireless security", IEEE Wireless Communication, Vol.11, No.1, pp.62-67, 2004.
|
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway, "UMAC: Fast and secure message authentication", Proc. of CRYPTO, Santa Barbara, California, USA, pp.216-233, 1999.
|