Anonymous authentication: For privacy and security

被引:0
|
作者
Sako, Kazue [1 ]
Yonezawa, Shoko [1 ]
Teranishi, Isamu [1 ]
机构
[1] Internet Systems Research Laboratories, Santa Clara, CA, United States
来源
NEC Journal of Advanced Technology | 2005年 / 2卷 / 01期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
6
引用
收藏
页码:79 / 83
相关论文
共 50 条
  • [1] Anonymous client authentication for transport layer security
    Institute for Applied Information Processing and Communications, University of Technology Graz, Inffeldgasse 16a, Graz
    8010, Austria
    Lect. Notes Comput. Sci., (268-280):
  • [2] Anonymous Client Authentication for Transport Layer Security
    Dietrich, Kurt
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 268 - 280
  • [3] On the Security of a Threshold Anonymous Authentication Protocol for VANETs
    Zhang, Jianhong
    Sun, Zhibin
    Liu, Shuai
    Liu, Pengyan
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 145 - 155
  • [4] On the security of an Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
    Kazemi, Mitra
    Delavar, Mahshid
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 510 - 514
  • [5] Privacy and authentication protocol providing anonymous channels in GSM
    Peinado, A
    COMPUTER COMMUNICATIONS, 2004, 27 (17) : 1709 - 1715
  • [6] Conditional Privacy-Preserving Anonymous Authentication Scheme With Forward Security in Vehicle-to-Grid Networks
    Wang, Qinglong
    Ou, Min
    Yang, Yun
    Duan, Zongtao
    IEEE ACCESS, 2020, 8 : 217592 - 217602
  • [7] Privacy and Security on Anonymous Routing Protocols in MANET
    Kumari, E. Hemalatha Jai
    Kannammal, A.
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 431 - +
  • [8] Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy
    Fan, Chun-I
    Huang, Vincent Shi-Ming
    APPLIED SCIENCES-BASEL, 2016, 6 (06):
  • [9] Security analysis of practical anonymous user authentication scheme with security proof
    Liu, Chenglian
    Lin, Changlu
    Sun, Shuliang
    Information Technology Journal, 2013, 12 (03) : 522 - 525
  • [10] An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications
    Rui Chen
    Dezhong Peng
    Wireless Personal Communications, 2017, 97 : 2665 - 2682