ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Design of Anonymity-Preserving User Authentication and Key Agreement Protocol for Ubiquitous Computing Environments
Lecture Notes in Computer Science - Internet and Network Economics
◽
10.1007/11600930_49
◽
2005
◽
pp. 491-499
Author(s):
Myung-hee Kang
◽
Hwang-bin Ryou
◽
WoongChul Choi
Keyword(s):
Ubiquitous Computing
◽
Key Agreement
◽
User Authentication
◽
Authentication And Key Agreement
◽
Key Agreement Protocol
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
Related Documents
Cited By
References
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07)
◽
10.1109/mue.2007.19
◽
2007
◽
Cited By ~ 1
Author(s):
Ren-Chiun Wang
◽
Wen-Shenq Juang
◽
Chen-Chi Wu
◽
Chin-Laung Lei
Keyword(s):
Ubiquitous Computing
◽
Key Agreement
◽
User Anonymity
◽
Key Agreement Protocol
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
An efficient anonymous user authentication and key agreement protocol for wireless sensor networks
International Journal of Communication Systems
◽
10.1002/dac.4724
◽
2021
◽
Vol 34
(5)
◽
Author(s):
Devender Kumar
◽
Harmanpreet Singh Grover
◽
Damandeep Kaur
◽
Adarsh Verma
◽
Khushil Kumar Saini
◽
...
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Key Agreement
◽
User Authentication
◽
Wireless Sensor
◽
Authentication And Key Agreement
◽
Key Agreement Protocol
Download Full-text
An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC
International Journal of Communication Systems
◽
10.1002/dac.3913
◽
2019
◽
Vol 32
(5)
◽
pp. e3913
◽
Cited By ~ 7
Author(s):
Arezou Ostad-Sharif
◽
Dariush Abbasinezhad-Mood
◽
Morteza Nikooghadam
Keyword(s):
Key Agreement
◽
User Authentication
◽
Authentication And Key Agreement
◽
Key Agreement Protocol
Download Full-text
Password-based remote user authentication and key agreement protocol
Journal of Computer Applications
◽
10.3724/sp.j.1087.2009.00924
◽
2009
◽
Vol 29
(4)
◽
pp. 924-927
Author(s):
Li-hua ZHANG
◽
Li-ping ZHANG
◽
You-guang ZHANG
◽
Shan-wei Lü
Keyword(s):
Key Agreement
◽
User Authentication
◽
Authentication And Key Agreement
◽
Key Agreement Protocol
◽
Remote User Authentication
◽
Remote User
Download Full-text
Efficient User Authentication and Key Agreement in Ubiquitous Computing
Computational Science and Its Applications - ICCSA 2006 - Lecture Notes in Computer Science
◽
10.1007/11751632_43
◽
2006
◽
pp. 396-405
◽
Cited By ~ 3
Author(s):
Wen-Shenq Juang
Keyword(s):
Ubiquitous Computing
◽
Key Agreement
◽
User Authentication
◽
Authentication And Key Agreement
Download Full-text
Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks
2013 International Symposium on Biometrics and Security Technologies
◽
10.1109/isbast.2013.23
◽
2013
◽
Cited By ~ 4
Author(s):
Qi Xie
◽
Mengjie Bao
◽
Na Dong
◽
Bin Hu
◽
Duncan S. Wong
Keyword(s):
Privacy Protection
◽
Key Agreement
◽
User Authentication
◽
Mobile User
◽
Authentication And Key Agreement
◽
Key Agreement Protocol
◽
Global Mobility
◽
Global Mobility Networks
Download Full-text
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
Nonlinear Dynamics
◽
10.1007/s11071-013-1029-y
◽
2013
◽
Vol 74
(4)
◽
pp. 1133-1143
◽
Cited By ~ 39
Author(s):
Chun-Ta Li
◽
Cheng-Chi Lee
◽
Chi-Yao Weng
Keyword(s):
Ubiquitous Computing
◽
Chaotic Maps
◽
User Authentication
◽
Privacy Preserving
◽
Dos Attacks
◽
Extended Chaotic Maps
◽
Computing Environments
◽
Pervasive And Ubiquitous Computing
◽
Ubiquitous Computing Environments
Download Full-text
A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS
Journal of Medical Systems
◽
10.1007/s10916-015-0217-3
◽
2015
◽
Vol 39
(3)
◽
Cited By ~ 66
Author(s):
Ruhul Amin
◽
G. P. Biswas
Keyword(s):
Key Agreement
◽
User Authentication
◽
Authentication And Key Agreement
◽
Key Agreement Protocol
Download Full-text
A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity
Journal of Medical Systems
◽
10.1007/s10916-015-0258-7
◽
2015
◽
Vol 39
(8)
◽
Cited By ~ 43
Author(s):
Ruhul Amin
◽
G. P. Biswas
Keyword(s):
Key Agreement
◽
User Authentication
◽
User Anonymity
◽
Authentication And Key Agreement
◽
Key Agreement Protocol
◽
Three Factor
Download Full-text
An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings
Ad Hoc Networks
◽
10.1016/j.adhoc.2012.01.002
◽
2012
◽
Vol 10
(6)
◽
pp. 1009-1016
◽
Cited By ~ 69
Author(s):
Debiao He
Keyword(s):
Key Agreement
◽
User Authentication
◽
Mobile Client
◽
Client Server
◽
Authentication And Key Agreement
◽
Key Agreement Protocol
◽
Remote User Authentication
◽
Remote User
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close