Kesdogan D and Palmer C. Technical challenges of network anonymity[J].Computer Communications.2006, 29(3):306-324[2][2] 3GPP TS 33.102 V8.1.0. Policy and charging control architecture[S]. Release 8, 2008-12.[3]Wu Chia-chun and Lee Wei-bin, et al.. A secure authentication scheme with anonymity for wireless communications[J].IEEE Communications Letters.2008, 12 (10):722-723[4]朱建明, 马建峰. 一种高效的具有用户匿名性的无线认证协议[J]. 通信学报, 2004, 25(6): 12-l8.[5]Zhu Jian-ming and Ma Jian-feng. An efficient authentication protocol with anonymity for wireless IP networks[J]. Journal of China Institute of Communication, 2004, 259(6): 12-18.[6]Zhu Jian-ming and Ma Jian-feng. A new authentication scheme with anonymity for wireless environment[J].IEEE Transactions on Consumer Electronic.2004, 50(1):231-235[7]Lee J S and Chang J H. Security flaw of authentication scheme with anonymity for wireless communications[J].IEEE Communications Letters.2009, 13(5):292-293[8]Wong D S. Security analysis of two anonymous authentication protocols for distributed wireless networks[C]. Third IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, Hawaii, USA, 2005: 284-288.[9]Zeng Peng and Cao Zhen-fu, et al.. On the anonymity of some authentication schemes for wireless communications[J].IEEE Communications Letters.2009, 13(3):170-171[10]Wei Yong-zhuang and Qiu Hong-bing, et al.. Security analysis of authentication scheme with anonymity for wireless environments [C]. International Conference on Communication Technology, Guilin, China, 2006: 1-4.[11]He Q, Wu D, and Khosla P. The Quest for personal control over mobile location privacy[J].IEEE Communications Magazine.2004, 42(5):130-136[12]Molva R, Samfat D, and Tsudik G. Authentication of mobile users[J]. IEEE Network, Special Issue on Mobile Communications, 1994, 8(2): 26-34.[13]Neuman B C and TSO T. Kerberos: an authentication service for computer networks[J].IEEE Communications Magazine.1994, 32(9):33-38[14]彭华熹, 冯登国. 匿名无线认证协议的匿名性缺陷和改进[J]. 通信学报, 2006, 27(9): 78-85.Peng Hua-xi and Feng Deng-guo. An efficient authentication protocol with anonymity for wireless IP networks [J]. Journal of China institute of Communication, 2006, 27(9): 78-85.[15]Lee Wei-bin and Chang-Kuo Y. A new delegation-based authentication protocol for use in portable communication systems[J].IEEE Transactions on Wireless Communications.2005, 4(1):57-64[16]Tang Cai-mu and Wu D O. An efficient mobile authentication scheme for wireless networks[J].IEEE Transactions on Wireless Communications.2008, 7(4):1408-1416[17]Tang Cai-mu and Wu D O. Mobile Privacy in Wireless Networks-Revisited[J].IEEE Transactions on Wireless Communications.2008, 7(3):1035-1042[18]Fu Jian-qing, Chen Jian, and Fan Rong, et al.. An efficient delegation-based anonymous authentication protocol[C]. Second International Workshop on Computer Science and Engineering, Qingdao, China, 2009, 1: 558-562.[19]Johnson D, Menezes A, and Vanstone S. The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001, 1(1): 36-63.[20]Ateniese G, Herzberg A, and Krawczyk H, et al.. Untraceable mobility or how to travel incognito[J].Computer Networks.1999, 31(8):785-899[21]Bozga L, Lakhnech Y, and Perin M. Hermes: An automatic tool for the verification of secrecy in security protocols[C]. 15th International Conference on Computer Aided Verification, Colorado, USA, 2003, 2725: 219-222.
|