Security limitations of an authorized anonymous ID-based scheme for mobile communication.

In this article we discuss the security limitations of a recently proposed authorized anonymous ID-based scheme for mobile communications due to He et al. We present three example attacks an attacker could mount on the scheme, point out the weaknesses we exploited, and suggest how to counter them. O...

Full description

Bibliographic Details
Published in:IEEE Communications magazine 43, 5 (2005).
Main Author: Phan, Raphael C.W
Format: Article
Language:English
Subjects: