Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was proposed.With elliptic curve cryptography and hash f...
Saved in:
Main Authors: | Yuehui CHEN, Miao HUANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2016-05-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2016144/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
by: Wumei ZHANG
Published: (2016-05-01) -
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
by: Jie ZHAO, et al.
Published: (2016-06-01) -
Research and design of parallel architecture processor for elliptic curve cryptography
by: YANG Xiao-hui, et al.
Published: (2011-01-01) -
Secure password-based authentication scheme with anonymous identity without smart cards
by: WANG Bang-ju1, et al.
Published: (2008-01-01) -
An Integrated Image Encryption Scheme Based on Elliptic Curve
by: Ijaz Khalid, et al.
Published: (2023-01-01)