Author:
Guo Xinglan,Yang Lei,Wu Tsu-Yang,Chen Lili,Chen Chien-Ming
Reference23 articles.
1. Alveras, D., Grotschel, M., Jonas, P., Paul, U.: Survivable mobile phone network architectures: models and solution methods. IEEE Commun. Mag. 36(3), 88–93 (1998)
2. Buttyan, L., Gbaguidi, C.: Extensions to an authentication technique proposed for the global mobility network. IEEE Trans. Commun. 48(3), 373–376 (2000)
3. Chang, C.C., Lee, C.Y., Chiu, Y.C.: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32(4), 611–618 (2009)
4. Chen, C.M., Xu, L., Wang, K.H., Liu, S., Wu, T.Y.: Cryptanalysis and improvements on three-party-authenticated key agreement protocols based on chaotic maps. J. Int. Technol. 19(3), 679–687 (2018)
5. Chen, C.M., Wang, K.H., Fang, W., Wu, T.Y., Wang, E.K.: Reconsidering a lightweight anonymous authentication protocol. J. Chin. Inst. Eng. 42(1), 9–14 (2019)