Security flaws and improvement to a wireless authentication protocol with anonymity
The anonymous security flaw of an authentication protocol with anonymity for wireless networks which was proposed by Zhu, et al. was analyzed, and an improved protocol to a wireless authentication protocol with anonymity (IWAA) was proposed. The anonymous security of the improved protocol was analyz...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2006-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74659916/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537368718311424 |
---|---|
author | PENG Hua-xi FENG Deng-guo |
author_facet | PENG Hua-xi FENG Deng-guo |
author_sort | PENG Hua-xi |
collection | DOAJ |
description | The anonymous security flaw of an authentication protocol with anonymity for wireless networks which was proposed by Zhu, et al. was analyzed, and an improved protocol to a wireless authentication protocol with anonymity (IWAA) was proposed. The anonymous security of the improved protocol was analyzed in a formal way. The research results reveal that the improvement can not only achieve authentication but also have a good anonymous property and achieve the ideal security requirements of anonymity for wireless network. |
format | Article |
id | doaj-art-070bb5833b2e4020ba2853b2216a2421 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2006-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-070bb5833b2e4020ba2853b2216a24212025-01-14T08:37:36ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2006-01-01788574659916Security flaws and improvement to a wireless authentication protocol with anonymityPENG Hua-xiFENG Deng-guoThe anonymous security flaw of an authentication protocol with anonymity for wireless networks which was proposed by Zhu, et al. was analyzed, and an improved protocol to a wireless authentication protocol with anonymity (IWAA) was proposed. The anonymous security of the improved protocol was analyzed in a formal way. The research results reveal that the improvement can not only achieve authentication but also have a good anonymous property and achieve the ideal security requirements of anonymity for wireless network.http://www.joconline.com.cn/zh/article/74659916/authenticationanonymitysecurity analysis |
spellingShingle | PENG Hua-xi FENG Deng-guo Security flaws and improvement to a wireless authentication protocol with anonymity Tongxin xuebao authentication anonymity security analysis |
title | Security flaws and improvement to a wireless authentication protocol with anonymity |
title_full | Security flaws and improvement to a wireless authentication protocol with anonymity |
title_fullStr | Security flaws and improvement to a wireless authentication protocol with anonymity |
title_full_unstemmed | Security flaws and improvement to a wireless authentication protocol with anonymity |
title_short | Security flaws and improvement to a wireless authentication protocol with anonymity |
title_sort | security flaws and improvement to a wireless authentication protocol with anonymity |
topic | authentication anonymity security analysis |
url | http://www.joconline.com.cn/zh/article/74659916/ |
work_keys_str_mv | AT penghuaxi securityflawsandimprovementtoawirelessauthenticationprotocolwithanonymity AT fengdengguo securityflawsandimprovementtoawirelessauthenticationprotocolwithanonymity |