Direct anonymous authentication scheme for wireless networks under trusted computing
Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network ag...
Saved in:
Main Authors: | YANG Li1, MA Jian-feng 1, PEI Qing-qi2, MA Zhuo 1 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74646018/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Trusted and anonymous authentication scheme for wireless networks
by: YANG Li1, et al.
Published: (2009-01-01) -
Improved direct anonymous attestation scheme for mobile computing platforms
by: Li YANG, et al.
Published: (2013-06-01) -
Threshold traceability anonymous authentication scheme without trusted center for ad hoc network
by: Fang-bin LIU, et al.
Published: (2012-08-01) -
k-times attribute-based authentication scheme using direct anonymous attestation
by: Xin LIU, et al.
Published: (2018-12-01) -
Identity-based anonymity authentication protocol in the heterogeneous wireless network
by: HOU Hui-fang1, et al.
Published: (2011-01-01)