In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs. They claimed that their proposed scheme provided identity privacy, mutual authentication, and half-forward secrecy. In this paper, we point out that Juang et al.'s protocol is vulnerable to the stolen-verifier attack and does not satisfy user anonymity
Designing a secure and efficient anonymous authentication protocol for roaming services in global mo...
Recently, Chen et al. proposed a practical authentication protocol for supporting anonymous roaming ...
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encry...
is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange ...
[[abstract]]Recently, Parks et al. proposed an authentication and key agreement protocol for low-pow...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]The use of anonymous channel tickets was proposed for authentication in wireless environ...
Anonymity is among the important properties of two-factor authentication schemes for wireless sensor...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]In recent years, several anonymous routing protocols for wireless ad hoc networks have b...
a b s t r a c t Anonymity is among the important properties of two-factor authentication schemes for...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services th...
Das first proposed two-factor authentication combining the smart card and password to resolve the se...
Das first proposed two-factor authentication combining the smart card and password to resolve the se...
Designing a secure and efficient anonymous authentication protocol for roaming services in global mo...
Recently, Chen et al. proposed a practical authentication protocol for supporting anonymous roaming ...
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encry...
is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange ...
[[abstract]]Recently, Parks et al. proposed an authentication and key agreement protocol for low-pow...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]The use of anonymous channel tickets was proposed for authentication in wireless environ...
Anonymity is among the important properties of two-factor authentication schemes for wireless sensor...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]In recent years, several anonymous routing protocols for wireless ad hoc networks have b...
a b s t r a c t Anonymity is among the important properties of two-factor authentication schemes for...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services th...
Das first proposed two-factor authentication combining the smart card and password to resolve the se...
Das first proposed two-factor authentication combining the smart card and password to resolve the se...
Designing a secure and efficient anonymous authentication protocol for roaming services in global mo...
Recently, Chen et al. proposed a practical authentication protocol for supporting anonymous roaming ...
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encry...