Author:
Gope Prosanta,Hwang Tzonelih
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference20 articles.
1. Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 230–234.
2. Lee, C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environment. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.
3. Wu, C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communication Letters, 12(10), 722–723.
4. Cheng, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhance authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32, 611–618.
5. Youn, T. Y., Park, T. H., & Lim, J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobile networks. IEEE Communication Letters, 13(7), 471–473.
Cited by
48 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献