Trusted and anonymous authentication scheme for wireless networks

A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide ide...

Full description

Bibliographic Details
Main Authors: YANG Li1, MA Jian-feng 1, ZHU Jian-ming 2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74649800/