Trusted and anonymous authentication scheme for wireless networks
A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide ide...
Saved in:
Main Authors: | YANG Li1, MA Jian-feng 1, ZHU Jian-ming 2 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74649800/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Direct anonymous authentication scheme for wireless networks under trusted computing
by: YANG Li1, et al.
Published: (2010-01-01) -
Improved direct anonymous attestation scheme for mobile computing platforms
by: Li YANG, et al.
Published: (2013-06-01) -
Design and validation for a remote attestation security protocol
by: WANG Dan, et al.
Published: (2009-01-01) -
Research on the trusted environment of container cloud based on the TPCM
by: Guojie LIU, et al.
Published: (2021-08-01) -
Research of platform identity attestation based on trusted chip
by: Qian-ying ZHANG, et al.
Published: (2014-08-01)