UM
Residential Collegefalse
Status已發表Published
An anonymous wireless authentication protocol based on proxy signature
Jiang C.1; Jia W.2; Gu K.1
2012-02-01
Source PublicationJournal of Computational Information Systems
ISSN15539105
Volume8Issue:2Pages:541-548
AbstractIn this paper, a new anonymous authentication protocol based on anonymous proxy signature for wireless communications is proposed. The protocol involves only two parties including mobile user and visited server, without the participation of home server. Then the security and performance of the protocol are analyzed and compared with existing protocols. It is shown that the proposed protocol is efficient and power-saving with low time delay, which is appropriate for practical application. 1553-9105/Copyright © 2012 Binary Information Press.
KeywordAnonymity Authentication Key exchange Proxy signature
URLView the original
Language英語English
Fulltext Access
Document TypeJournal article
CollectionUniversity of Macau
Affiliation1.Central South University China
2.City University of Hong Kong
Recommended Citation
GB/T 7714
Jiang C.,Jia W.,Gu K.. An anonymous wireless authentication protocol based on proxy signature[J]. Journal of Computational Information Systems, 2012, 8(2), 541-548.
APA Jiang C.., Jia W.., & Gu K. (2012). An anonymous wireless authentication protocol based on proxy signature. Journal of Computational Information Systems, 8(2), 541-548.
MLA Jiang C.,et al."An anonymous wireless authentication protocol based on proxy signature".Journal of Computational Information Systems 8.2(2012):541-548.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Jiang C.]'s Articles
[Jia W.]'s Articles
[Gu K.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Jiang C.]'s Articles
[Jia W.]'s Articles
[Gu K.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Jiang C.]'s Articles
[Jia W.]'s Articles
[Gu K.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.