1 |
C.C. Lee, M.S. Hwang, and I.E. Liao, "Security enhancement on a new authentication scheme with anonymity for wireless environments," IEEE Trans. Industrial Electron, vol. 53, no. 5, pp. 1683-1687, Oct. 2006
DOI
ScienceOn
|
2 |
C.C. Wu, W.B. Lee, and W.J. Tsaur, "A Secure Authentication Scheme with Anonymity for Wireless Communications," IEEE Communications Letters, vol. 12, no. 10, pp. 722-723, Oct. 2008
DOI
ScienceOn
|
3 |
L. Buttyan, C. Gbaguidi, S. Staamann, and U. Wilhelm, "Extensions to an authentication technique proposed for the global mobility network," IEEE Transactions on Communications, vol. 48, no. 3, pp. 373-376, Mar. 2000
DOI
ScienceOn
|
4 |
C.C. Chang, C.Y. Lee, and Y.C. Chiu, "Enhanced authentication scheme with anonymity for roaming service in global mobility networks," Computer Communications, vol. 32, issue. 4, pp. 611-618, Mar. 2009
DOI
ScienceOn
|
5 |
J. Zhu and J. Ma, "A new authentication scheme with anonymity for wireless environments," IEEE Trans. Consumer Electron, vol. 50, no. 1, pp. 230-234, Feb. 2004
|