Identity-based anonymity authentication protocol in the heterogeneous wireless network
Aiming at the security of authentication protocol for heterogeneous wireless network,a mutual authentication and key agreement protocol,which was based on CPK algorithm and improved ECDH algorithm,was proposed.The temporary authentication identity and temporary communication identity was adopted to...
Saved in:
Main Authors: | HOU Hui-fang1, JI Xin-sheng2, LIU Guang-qiang1 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74418458/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
by: JIANG Qi1, et al.
Published: (2010-01-01) -
Direct anonymous authentication scheme for wireless networks under trusted computing
by: YANG Li1, et al.
Published: (2010-01-01) -
ID-based wireless authentication scheme with anonymity
by: ZHU Hui, et al.
Published: (2009-01-01) -
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
by: Yuehui CHEN, et al.
Published: (2016-05-01) -
Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network
by: Shun ZHANG, et al.
Published: (2018-04-01)