Please use this identifier to cite or link to this item:
http://hdl.handle.net/11455/43647
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Li, C.T. | en_US |
dc.contributor.author | 黃明祥 | zh_TW |
dc.contributor.author | Hwang, M.S. | en_US |
dc.contributor.author | Chu, Y.P. | en_US |
dc.date | 2008 | zh_TW |
dc.date.accessioned | 2014-06-06T08:11:17Z | - |
dc.date.available | 2014-06-06T08:11:17Z | - |
dc.identifier.issn | 0140-3664 | zh_TW |
dc.identifier.uri | http://hdl.handle.net/11455/43647 | - |
dc.description.abstract | Privacy and authentication ire very important concepts and service levels to anonymous communications and data confidentiality. Recently, Ren et at. proposed an authentication and access control scheme for preserving privacy in pervasive computing environments (PCEs). However, in this paper, it is demonstrated that the so-called secure, privacy preserving authentication and access control scheme proposed by Ren et al. is vulnerable to service abuse attacks and, as a result. illegitimate users can freely access the service through the service provider without any worries and this flaw would lead to a serious accounting problem with their scheme. Therefore, we proposed a security improvement to their scheme to neutralize this weakness and an efficiency improvement to enhance the performance of their scheme in the user operational phase. More importantly, a new improved proposal for a scheme can still allow the mobile user to anonymously interact with the service provider in a PCE is demonstrated. (C) 2008 Elsevier B.V. All rights reserved. | en_US |
dc.language.iso | en_US | zh_TW |
dc.relation | Computer Communications | en_US |
dc.relation.ispartofseries | Computer Communications, Volume 31, Issue 18, Page(s) 4255-4258. | en_US |
dc.relation.uri | http://dx.doi.org/10.1016/j.comcom.2008.06.002 | en_US |
dc.subject | Access control | en_US |
dc.subject | Authentication | en_US |
dc.subject | Privacy | en_US |
dc.subject | Pervasive Computing | en_US |
dc.subject | Environment | en_US |
dc.subject | Security | en_US |
dc.title | Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments | en_US |
dc.type | Journal Article | zh_TW |
dc.identifier.doi | 10.1016/j.comcom.2008.06.002 | zh_TW |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.languageiso639-1 | en_US | - |
item.fulltext | no fulltext | - |
item.grantfulltext | none | - |
item.openairetype | Journal Article | - |
Appears in Collections: | 資訊管理學系 |
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.