共 107 条
[1]
Suzuki S(1997)An authentication technique based on distributed security management for the global mobility network IEEE J. Sel. Areas Commun. 15 1608-1617
[2]
Nakada K(2011)An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks Comput. Commun. 34 319-325
[3]
Xu J(2015)A secure authentication scheme with user anonymity for roaming service in global mobility networks Wirel. Pers. Commun. 84 2055-2078
[4]
Zhu W-T(2014)Robust two-factor authentication and key agreement preserving user privacy Int. J. Netw. Secur. 16 229-240
[5]
Feng D-G(2018)Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges Future Gener. Comput. Syst. 78 680-698
[6]
Karuppiah M(2014)Robust anonymous two-factor authentication scheme for roaming service in global mobility network Wirel. Pers. Commun. 74 601-614
[7]
Saravanan R(2013)An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks Wirel. Pers. Commun. 68 1477-1491
[8]
Jiang Q(2015)An efficient and robust anonymous authentication scheme in global mobility networks Int. J. Secur. Appl. 9 297-312
[9]
Ma J(2011)A user friendly authentication scheme with anonymity for wireless communications Comput. Electr. Eng. 37 356-364
[10]
Li G(2006)Security enhancement on a new authentication scheme with anonymity for wireless environments IEEE Trans. Ind. Electron. 53 1683-1687