Security limitations of an authorized anonymous ID-based scheme for mobile communication.

In this article we discuss the security limitations of a recently proposed authorized anonymous ID-based scheme for mobile communications due to He et al. We present three example attacks an attacker could mount on the scheme, point out the weaknesses we exploited, and suggest how to counter them. O...

Disgrifiad llawn

Manylion Llyfryddiaeth
Cyhoeddwyd yn:IEEE Communications magazine 43, 5 (2005).
Prif Awdur: Phan, Raphael C.W
Fformat: Erthygl
Iaith:English
Pynciau: