2. Tang C, Wu D O. An efficient mobile authentication scheme for wireless networks. IEEE Transactions on Wireless Communications, 2008, 7(4): 1408-1416
3. Zhu H, Li H, Su W L, et al. ID-based wireless authentication scheme with anonymity. Journal on Communications, 2009, 30(4): 130-136 (in Chinese)
4. Fu J Q, Chen J, Fan R, et al. An efficient delegation-based anonymous authentication protocol. Proceedings of the 2nd International Workshop on Computer Science and Engineering (WCSE’09): Vol 1, Oct 28-30, 2009, Qingdao, China. Piscataway, NJ, USA: IEEE, 2009: 558-562
5. Chen T H, Chen Y C, Shin W K, et al. An efficient anonymous authentication protocol for mobile pay-TV. Journal of Network and Computer Applications, 2011, 34(4): 1131-1137
6. Li K, Xiu A N, He F, et al. Anonymous authentication with unlinkability for wireless environments. IEICE Electronics Express, 2011, 8(8): 536-541
7. Mun H, Han K, Lee Y S, et al. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 2012, 55(1): 214-222
8. Zheng Y, He D K, He M X. Trusted computing based user authentication for mobile equipment. Chinese Journal of Computers, 2006, 29(8): 1255-1264 (in Chinese)
9. Wu C C, Lee W B, Tsaur W J. A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 2008, 12(10): 722-723
10. Wu Z Q, Zhou Y W, Qiao Z R. Access mechanism of PMP under mobile network. Journal on Communications, 2010, 31(10): 158-169 (in Chinese)
11. Yang L, Ma J F, Pei Q Q, et al. Direct anonymous authentication scheme for wireless networks under trusted computing, Journal on Communications, 2010, 31(8): 98-104 (in Chinese)
12. Liu J Y, Gu L Z, Luo S S, et al. Anonymous authentication scheme for mobile communication. Journal of Xidian University, 2011, 38(1): 176-183 (in Chinese)
13. Brickell E, Li J T. Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities. IEEE Transactions on Dependable and Secure Computing, 2012, 9(3): 345-360
14. Kim H, Shin K G, Dabbous W. Improving cross-domain authentication over wireless local area networks. Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm’05), Sep 5-9, 2005, Athens Greece. Piscataway, NJ, USA: IEEE, 2005: 127-138 |