Journal ArticleDOI
A Secure Authentication Scheme with Anonymity for Wireless Communications
TLDR
This paper will discuss a few problems found in the enhanced scheme and then propose how to overcome them, regarding the properties of anonymity and backward secrecy.Abstract:
Recently, a new authentication scheme with anonymity for wireless communications has been proposed, and then some security problems have been demonstrated. In this paper, we will discuss a few problems found in the enhanced scheme and then propose how to overcome them, regarding the properties of anonymity and backward secrecy.read more
Citations
More filters
Journal ArticleDOI
A strong user authentication scheme with smart cards for wireless communications
TL;DR: A secure and light-weight authentication scheme with user anonymity for wireless communications that is secure in the case that the information stored in thesmart card is disclosed but the user password of the smart card owner is unknown to the attacker.
Journal ArticleDOI
On the anonymity of two-factor authentication schemes for wireless sensor networks
Ding Wang,Ping Wang +1 more
TL;DR: A general principle is put forward: Public-key techniques are intrinsically indispensable to construct a two-factor authentication scheme that can support user anonymity, and can be applied to two-Factor schemes for universal environments besides WSNs, such as the Internet, global mobility networks and mobile clouds.
Journal ArticleDOI
Enhanced three-factor security protocol for consumer USB mass storage devices
TL;DR: This paper proposes significant enhancements to the three-factor control protocol that now makes it secure under many types of attacks including the password guessing attack, the denial-of-service attack, and the replay attack.
Journal ArticleDOI
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
TL;DR: This article shows that Lee-Hwang-Liao's scheme cannot provide anonymity under the forgery attack, and a novel authentication scheme to overcome these weaknesses that is efficient, secure, and suitable for battery-powered mobile devices in global mobility networks is proposed.
Journal ArticleDOI
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
TL;DR: This paper strengthens the security of the scheme by addressing untraceability property such that any third party over the communication channel cannot tell whether or not he has seen the same (unknown) smart card twice through the authentication sessions.
References
More filters
Journal ArticleDOI
A new authentication scheme with anonymity for wireless environments
Jianming Zhu,Jianfeng Ma +1 more
TL;DR: This paper presents a new and efficient wireless authentication protocol providing user anonymity based on the hash function and smart cards, and mobile users only do symmetric encryption and decryption.
Journal ArticleDOI
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments
TL;DR: The scheme proposed in this paper can enhance the security of Zhu and Ma's scheme and is also simple and efficient.
Related Papers (5)
A new authentication scheme with anonymity for wireless environments
Jianming Zhu,Jianfeng Ma +1 more