|
[1] J. Zhu and J. Ma, "A New Authentication Scheme with Anonymity for Wireless Environments," IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 231-235, 2004. [2] C. C. Lee, M. S. Hwang, and I. E. Liao, "Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments," IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683- 1687, 2006. [3] C. C. Wu, W. B. Lee, and W. J. Tsaur, "A Secure Authentication Scheme with Anonymity for Wireless Communications," IEEE Commu- nications Letters, vol. 12, no. 10, pp. 722-723, 2008. [4] S. Machiraju, H. Chen, and J. Bolot, "Distributed Authentication for Low-Cost Wireless Networks," Proceedings of the 9th Workshop on Mo- bile Computing Systems and Applications, pp. 55-59, 2008. [5] A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, pp. 324-328, 2005. [6] B. Vaidya, J. S. Silva, and J.J.P.C. Rodrigues, "Robust Dynamic User Authentication Scheme for Wireless Sensor Networks," Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks, pp. 88-91, 2009. [7] C. Tang and D. O. Wu, "An E cient Mobile Authentication Scheme for Wireless Networks," IEEE Transactions on Wireless Communications, pp. 1408-1416, 2008. [8] W. B. Lee and C. K. Yeh, "A New Delegation-Based Authentication Protocol for Use in Portable Communication Systems," IEEE transac- tions on wireless communications, pp. 57-64, 2005. [9] C. H. Wang, T. C. Wei, P. C. Lee, and C. C. Wu, "An Improvement of Secure Authentication Scheme with Full Anonymity for Wireless Com- munications," Proceedings of the 2nd International Conference on In- teraction Sciences: Information Technology, Culture and Human, pp. 115-118, 2009. Network, Special Issue on Mobile Communications, pp. 2634, 1994. [11] Y. Jiang, C. Lin, X. Shen, and M. Shi, "Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks," IEEE Transactions on Wireless Communications, pp. 2569-2577, 2006. [12] S. Cui, P. Duan, and C. W. Chan, "An cient Identity-Based Signa- ture Scheme with Batch Veri cations," ACM International Conference Proceeding Series, vol. 152, no. 22, 2006. [13] Y. Wei and H. Qiu, "A Novel Wireless AuthenticationProtocol Preserv- ing User Anonymityand Untraceability," International Conference on Communication Technology, ICCT ''06, pp. 27-30, 2006. [14] S. J. Wang, "Anonymous Wireless Authentication on a Portable Cellu- lar Mobile System," IEEE Transactions on Computers, pp. 1317-1329, 2004. [15] A. Sui, L. C. K. Hui, Y. Yang and K. P. Chow, "Elliptic Curve Cryptog- raphy Based Authenticated Key Agreement with Pre-shared Password," Journal of Electronics (China), vol. 22, no.3, 2005. [16] A. Aziz and W. Di e, "Privacy and Authentication for Wireless Local Area Networks," IEEE Personal Communications, pp. 25-31, 1994. [17] D. Weinshall, "Cognitive Authentication Schemes Safe Against Spy- ware," IEEE Symposium on Security and Privacy, pp. 295-300, 2006. [18] P. Golle and D. Wagner, "Cryptanalysis of a Cognitive Authentication Scheme," IEEE Symposium on Security and Privacy, pp. 66-70, 2007. [19] M. Zviran and W. J. Haga, "User Authentication by Cognitive Pass- words: An Empirical Assessment," Proceedings of the 5th Jerusalem Conference on Information Technology, pp. 137-144, 1990. [20] A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Proceedings of CRYPTO 84 on Advances in Cryptology, pp. 47-53, 1985. [21] K.G. Paterson, "ID-Based Signatures from Pairings on Elliptic Curves," Electronics Letters, pp. 1025-1026, 2002. [22] J. H. Yang and C. C. Chang, "Cryptanalysis of ID-Based Digital Sig- nature Scheme on Elliptic Curve Cryptosystem," Eighth International Conference on Intelligent Systems Design and Applications, pp. 3-5, 2008. [23] Z. Guo, X. He, and B. Xun, "Security Arguments for a Class of ID-Based Signatures," Second International Conference on the Digital Society, pp. 165-170, 2008. [24] T. Menon and R.Sindhuja, "ID Based Signature Schemes for Electronic Voting," Second International Conference on Computer and Electrical Engineering, pp. 403-406, 2009. [25] Y. Xinchun, Y. Shuying, O. Funa, and Z. Hailing, "An ID-Based Con- tent Extraction Signatures without Trusted Party," IEEE Conference on Industrial Electronics and Applications, pp. 1801-1804, 2010. [26] Y. Xinchun, Y. Shuying, O. Funa, and Z. Hailing, "Scheme for (t, n) Threshold Id-Based Signature without a Trusted Dealer," International Conference on Wavelet Analysis and Pattern Recognition, pp. 1341- 1345, 2007.
|