English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90453/105671 (86%)
Visitors : 15650696      Online Users : 113
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/87219

    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/87219

    Title: Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks
    Authors: 張真誠;CHang, Chin-Chen;*;Hua, Ya-Chieh;Huang, Ya-Chieh;Ts, Hao-Chuan;Tsai, Hao-Chuan
    Contributors: 資訊工程學系
    Keywords: handover;mobile authentication;key agreement;scalable;wireless networks
    Date: 2014-01
    Issue Date: 2014-12-30 11:38:32 (UTC+8)
    Abstract: An increasing number of mobile users are allowed and promoted universal
    access over the wireless networks. Roughly speaking, an authentication mechanism is
    needed between mobile users and access points, also, an authenticated key is highly desirable
    to support secure communications in wireless networks. In addition, the anonymous
    property is an important security requirement, such as the information of customer behavior,
    which is needed to achieve. Recent researches have focused on these issues and
    have provided definitions and some constructions. Especially, Choi and Jung proposed
    an efficient handover authentication scheme which enjoys both computation efficiency
    and communication efficiency as compared well-known handover authentication schemes
    recently. Unfortunately, we still find out that Choi and Jung’s scheme is vulnerable to
    a man-in-the-middle attack. To make handover authentication scheme more impeccable,
    therefore, we propose an enhanced version to provide the better security and the computation
    Relation: Journal of Information Hiding and Multimedia Signal Processing
    Appears in Collections:[資訊工程學系] 期刊論文

    Files in This Item:

    File SizeFormat

    All items in ASIAIR are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback