Security limitations of an authorized anonymous ID-based scheme for mobile communication

In this article we discuss the security limitations of a recently proposed authorized anonymous ID-based scheme for mobile communications due to He et al. We present three example attacks an attacker could mount on the scheme, point out the weaknesses we exploited, and suggest how to counter them. O...

Full description

Saved in:
Bibliographic Details
Main Author: Raphael C.-W. Phan
Format: Default Article
Published: 2005
Subjects:
Online Access:https://hdl.handle.net/2134/5677
Tags: Add Tag
No Tags, Be the first to tag this record!