|
[1] Levente Buttyan, Constant Gbaguidi, Sebastian Staamann, and Uwe Wilhelm. Extensions to an authentication technique proposed for the global mobility network. Communications, IEEE Transactions on, 48(3):373–376, 2000. [2] Cheng Guo, Chin Chen Chang, and Chin Yu Sun. Chaotic maps-based mutual authentication and key agreement using smart cards for wireless communications. Journal of information Hiding and Multimedia Signal Processing, 4(2): 99–109, 2013. [3] Carmit Hazay and Yehuda Lindell. Constructions of truly practical secure protocols using standardsmartcards. In Proceedings of the 15th ACM conference on Computer and communications security, pages 491–500. ACM, 2008. [4] Daojing He, Maode Ma, Yan Zhang, Chun Chen, and Jiajun Bu. A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3):367–374, 2011. [5] L Kocarev, J Makraduli, and P Amato. Public-key encryption based on chebyshev polynomials. Circuits, Systems and Signal Processing, 24(5):497–517, 2005. [6] Ramanujachary Kumanduri, Cristina Romero, Cristina Romero, and R Kumanduri. Number theory with computer applications. Prentice Hall New Jersey, 1998. [7] Cheng Chi Lee, Min Shiang Hwang, and I En Liao. Security enhancement on a new authentication scheme with anonymity for wireless environments. Industrial Electronics, IEEE Transactions on, 53(5):1683–1687, 2006. [8] Ji Seon Lee, Jik Hyun Chang, and Dong Hoon Lee. Security flaw of authentication scheme with anonymity for wireless communications. Communications Letters, IEEE, 13(5):292–293, May 2009. [9] Chun Ta Li and Cheng Chi Lee. A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55(1):35–44, 2012. [10] Chu Hsing Lin and Chia Yin Lee. Cryptanalysis of a new authentication scheme with anonymity for wireless environments. In Proceedings of the Second International Conference on Advances in Mobile Multimedia, Bali, Indonesia, pages 399–402, 2004. [11] Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, and Hyo Hyun Choi. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55(1):214–222, 2012. [12] M. O. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical report, Cambridge, MA, USA, 1979. [13] Shigefusa Suzuki and Kazuhiko Nakada. An authentication technique based on distributed security management for the global mobility network. Selected Areas in Communications, IEEE Journal on, 15(8):1608–1617, 1997. [14] Zhi-Jia Tzeng and Wen Guey Tzeng. Authentication of mobile users in third generation mobile systems. Wireless Personal Communications, 16(1):35–50, 2001. [15] Xingyuan Wang and Jianfeng Zhao. An improved key agreement protocol based on chaos. Communications in Nonlinear Science and Numerical Simulation, 15(12):4052–4057, 2010. [16] HC Williams. A modification of the rsa public-key encryption procedure (corresp.). Information Theory, IEEE Transactions on, 26(6):726–729, 1980. [17] Chia Chun Wu, Wei Bin Lee, and Woei Jiunn Tsaur. A secure authentication scheme with anonymity for wireless communications. Communications Letters, IEEE, 12(10):722–723, 2008. [18] Jing Xu, Wen Tao Zhu, and Deng Guo Feng. An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications, 34(3):319–325, 2011. [19] Guomin Yang, Duncan S Wong, and Xiaotie Deng. Anonymous and authenticated key exchange for roaming networks. Wireless Communications, IEEE Transactions on, 6(9):3461–3472, 2007. [20] Eun Jun Yoon and Il Soo Jeon. An efficient and secure diffie–hellman key agreement protocol based on chebyshev chaotic map. Communications in Nonlinear Science and Numerical Simulation, 16(6):2383–2389, 2011. [21] Eun Jun Yoon, Kee Young Yoo, and Keum Sook Ha. A user friendly authentication scheme with anonymity for wireless communications. Computers & Electrical Engineering, 37(3):356–364, 2011. [22] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons & Fractals, 37(3):669–674, 2008. [23] Tao Zhou and Jing Xu. Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Computer Networks, 55(1):205–213, 2011. [24] Jianming Zhu and Jianfeng Ma. A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1):231–235, 2004. |