WANG Yi, HAN Guang-guo, LI Hui-zhi. Provable Security Mobile User Key Exchange Protocol for Wireless Communications[J]. Netinfo Security, 2015, 15(3): 54-58.
Daojing He, Sammy Chan.A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network[C]//2010 13th International on Network-Based Information Systems.305-312.
[2]
李顺东,王道顺. 现代密码学:理论、方法与研究前沿[M]. 北京:科学出版社, 2009.
[3]
Douglas R Stinson.密码学原理与实践(第三版)[M]. 冯登国,等译.北京:电子工业出版社,2009.
[4]
Lee C C, Hwang M S, Liao I E.Security enhancement on a new authentication scheme with anonymity for wireless environments[J]. IEEE Transactions on Consumer Electronics, 2006,53(5):1683-1687.
[5]
Zeng P, Cao Z, Choo K-K R, et al. On the anonymity of some authentication schemes for wireless communications[J]. IEEE Communication Letter, 2009,13(3):170-171.
[6]
Daojing He, Chun Chen, Sammy Chan,et al.Secure and efficient handover authenticatio based on bilinear pairing functions[J]. IEEE Transactions on Consumer Electronics, 2012, 11(1):48-53.
[7]
Suzukiz S, Nakada K.An authentication technique based on distributed security management for the global mobility network[J]. IEEE Journal on Selected Areas in Communications, 1997,15(8):1608-1617.
[8]
Wu C C, Lee W B, Tsaur W J.A secure authentication scheme with anonymity for wireless communications[J]. IEEE Communication Letter, 2008,12(10):722-723.
[9]
Rabin M O.Digital signature and public key functions as intractable as factorization[J]. MIT Laboratory Computer Science, MIT/LCS/TR-212, 1979,15(6):238-241.
[10]
Williams H C.A modification of the RSA public key encryption procedure[J]. IEEE Transactions on Information Theory, 1980,26(6):726-729.