On the anonymity of some authentication schemes for wireless communications.
Peng ZengZhenfu CaoKim-Kwang Raymond ChooShengbao WangPublished in: IEEE Commun. Lett. (2009)
Keyphrases
- wireless communication
- wireless networks
- short range
- computer simulation
- communication networks
- wireless sensor networks
- mobile communication
- mobile computing
- wifi
- wireless channels
- trusted third party
- wireless transmission
- cognitive radio
- communication technologies
- fourth generation
- biometric authentication
- wireless technologies
- long range
- security analysis
- intrusion detection
- graphical password
- data sets