Analysis of One Secure Key Agreement and Key Protection for Mobile Device User Authentication

被引:0
|
作者
Liu, Lihua [1 ]
Hong, Leming [1 ]
Cao, Zhengjun [2 ]
机构
[1] Department of Mathematics, Shanghai Maritime University, No.1550,Haigang Ave, Shanghai, China
[2] Department of Mathematics, Shanghai University, No.99,Shangda Road, Shanghai,200444, China
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Authentication
引用
收藏
页码:238 / 242
相关论文
共 50 条
  • [21] Efficient 3 GPP authentication and key agreement with robust user privacy protection
    Juang, Wen-Senq
    Wu, Jing-Lin
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 2722 - 2727
  • [22] Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    Rodrigues, Joel J. P. C.
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 3572 - 3584
  • [23] A Secure One-to-Many Authentication and Key Agreement Scheme for Industrial IoT
    Ming, Yang
    Yang, Pengfei
    Mahdikhani, Hassan
    Lu, Rongxing
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2225 - 2236
  • [24] An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems
    Lee, Young Sil
    Ndibanje, Bruce
    Alasaarela, Esko
    Kim, TaeYong
    Lee, HoonJae
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1685 - 1690
  • [25] A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme
    Chandrakar, Preeti
    Om, Hari
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2016, 12 (02) : 62 - 79
  • [26] An improved remote user authentication scheme with key agreement
    Kumari, Saru
    Khan, Muhammad Khurram
    Li, Xiong
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1997 - 2012
  • [27] Privacy-Preserved Key Agreement with User Authentication
    Hsu, Chien-Lung
    Lin, Tzu-Wei
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 12 - 17
  • [28] Cryptanalysis of Remote User Authentication Scheme with key agreement
    Madhusudan, R.
    Valiveti, Annapurna
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [29] Efficient user authentication and key agreement in ubiquitous computing
    Juang, WS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 396 - 405
  • [30] An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 319 - 325