Security limitations of an authorized anonymous ID-based scheme for mobile communication.

In this article we discuss the security limitations of a recently proposed authorized anonymous ID-based scheme for mobile communications due to He et al. We present three example attacks an attacker could mount on the scheme, point out the weaknesses we exploited, and suggest how to counter them. O...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Τόπος έκδοσης:IEEE Communications magazine 43, 5 (2005).
Κύριος συγγραφέας: Phan, Raphael C.W
Μορφή: Άρθρο
Γλώσσα:English
Θέματα: