ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks
2015 IEEE Global Communications Conference (GLOBECOM)
◽
10.1109/glocom.2014.7417584
◽
2014
◽
Author(s):
Xinghua Li
◽
Hai Liu
◽
Fushan Wei
◽
Jianfeng Ma
◽
Weidong Yang
Keyword(s):
Wireless Networks
◽
Authentication Protocol
◽
Anonymous Authentication
Download Full-text
Related Documents
Cited By
References
A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks
2015 IEEE Global Communications Conference (GLOBECOM)
◽
10.1109/glocom.2015.7417584
◽
2015
◽
Cited By ~ 4
Author(s):
Xinghua Li
◽
Hai Liu
◽
Fushan Wei
◽
Jianfeng Ma
◽
Weidong Yang
Keyword(s):
Wireless Networks
◽
Authentication Protocol
◽
Anonymous Authentication
Download Full-text
A Lightweight Anonymous Authentication Protocol For IoT Wireless Sensor Networks
2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)
◽
10.1109/iscisc48546.2019.8985154
◽
2019
◽
Cited By ~ 1
Author(s):
Abbas Rahnama
◽
Mohammad Beheshti-Atashgah
◽
Taraneh Eghlidos
◽
Mohammad Reza Aref
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Authentication Protocol
◽
Wireless Sensor
◽
Anonymous Authentication
Download Full-text
A Threshold Anonymous Authentication Protocol for VANETs
IEEE Transactions on Vehicular Technology
◽
10.1109/tvt.2015.2405853
◽
2016
◽
Vol 65
(3)
◽
pp. 1711-1720
◽
Cited By ~ 101
Author(s):
Jun Shao
◽
Xiaodong Lin
◽
Rongxing Lu
◽
Cong Zuo
Keyword(s):
Authentication Protocol
◽
Anonymous Authentication
Download Full-text
A Multicast Authentication Protocol (MAP) for Dynamic Multicast Groups in Wireless Networks
Communications in Computer and Information Science - Security in Computing and Communications
◽
10.1007/978-3-642-40576-1_14
◽
2013
◽
pp. 138-149
◽
Cited By ~ 1
Author(s):
Parag J. Jambhulkar
◽
Soumyadev Maity
◽
Ramesh C. Hansdah
Keyword(s):
Wireless Networks
◽
Authentication Protocol
◽
Dynamic Multicast
Download Full-text
A Secure Authentication Protocol with Performance Enhancements for 4G LTE/LTE-A Wireless Networks
10.1145/3475971.3475977
◽
2021
◽
Author(s):
Vu Thi Hoang Ahn
◽
Maode Ma
Keyword(s):
Wireless Networks
◽
Authentication Protocol
◽
4G Lte
◽
Secure Authentication
Download Full-text
Efficient Authentication Protocol for Heterogeneous Wireless Networks
Communications in Computer and Information Science - Information, Communication and Computing Technology
◽
10.1007/978-981-15-9671-1_11
◽
2020
◽
pp. 135-146
Author(s):
Ashish Joshi
◽
Amar Kumar Mohapatra
Keyword(s):
Wireless Networks
◽
Heterogeneous Wireless Networks
◽
Authentication Protocol
Download Full-text
Anonymous Authentication Protocol for Mobile Pay-TV System
Communications in Computer and Information Science - Computer Applications for Security, Control and System Engineering
◽
10.1007/978-3-642-35264-5_63
◽
2012
◽
pp. 471-478
◽
Cited By ~ 1
Author(s):
Hyunsung Kim
◽
Sung Woon Lee
Keyword(s):
Authentication Protocol
◽
Anonymous Authentication
◽
Pay Tv
Download Full-text
Cryptanalysis on An Efficient Anonymous Authentication Protocol for Mobile Pay-TV
Lecture Notes in Electrical Engineering - Future Information Technology, Application, and Service
◽
10.1007/978-94-007-4516-2_32
◽
2012
◽
pp. 327-334
◽
Cited By ~ 2
Author(s):
Hyun Sung Kim
Keyword(s):
Authentication Protocol
◽
Anonymous Authentication
◽
Pay Tv
Download Full-text
ENSURING SECURED DATA ACCESS IN WSN USING ANONYMOUS AUTHENTICATION PROTOCOL
Adalya Journal
◽
10.37896/aj9.5/030
◽
2020
◽
Vol 9
(5)
◽
Keyword(s):
Data Access
◽
Authentication Protocol
◽
Anonymous Authentication
◽
Secured Data
Download Full-text
A provably secure pairing-free anonymous handover authentication protocol for mobile wireless networks
International Journal of Mobile Communications
◽
10.1504/ijmc.2020.109976
◽
2020
◽
Vol 18
(5)
◽
pp. 509
Author(s):
Sunday Oyinlola Ogundoyin
Keyword(s):
Wireless Networks
◽
Authentication Protocol
◽
Mobile Wireless Networks
◽
Handover Authentication
◽
Mobile Wireless
◽
Provably Secure
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close