{"id":"https://openalex.org/W1989829552","doi":"https://doi.org/10.1109/iwcmc.2014.6906408","title":"Distributed anonymous authentication in heterogeneous networks","display_name":"Distributed anonymous authentication in heterogeneous networks","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W1989829552","doi":"https://doi.org/10.1109/iwcmc.2014.6906408","mag":"1989829552"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2014.6906408","is_oa":true,"landing_page_url":"https://doi.org/10.1109/iwcmc.2014.6906408","pdf_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6906408","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6906408","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040420733","display_name":"Shin\u2010Ming Cheng","orcid":"https://orcid.org/0000-0002-9796-0643"},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Shin-Ming Cheng","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan","Dept. of Computer Science and Information Engineering, National Taiwan University of Science and Technology Taipei 106, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan","institution_ids":["https://openalex.org/I154864474"]},{"raw_affiliation_string":"Dept. of Computer Science and Information Engineering, National Taiwan University of Science and Technology Taipei 106, Taiwan","institution_ids":["https://openalex.org/I154864474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111536824","display_name":"Cheng-Han Ho","orcid":null},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Cheng-Han Ho","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan","Dept. of Computer Science and Information Engineering, National Taiwan University of Science and Technology Taipei 106, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan","institution_ids":["https://openalex.org/I154864474"]},{"raw_affiliation_string":"Dept. of Computer Science and Information Engineering, National Taiwan University of Science and Technology Taipei 106, Taiwan","institution_ids":["https://openalex.org/I154864474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039856453","display_name":"Shannon Chen","orcid":"https://orcid.org/0000-0002-8383-2237"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shannon Chen","raw_affiliation_strings":["Department of Computer Science, University of Illinois at Urbana-Champaign, Illinois, USA","[Dept. of Computer Science, Univ. of Illinois at Urbana, Champaign, USA]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois at Urbana-Champaign, Illinois, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"[Dept. of Computer Science, Univ. of Illinois at Urbana, Champaign, USA]","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111659995","display_name":"Shih\u2010Hao Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I107470533","display_name":"Tamkang University","ror":"https://ror.org/04tft4718","country_code":"TW","type":"education","lineage":["https://openalex.org/I107470533"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shih-Hao Chang","raw_affiliation_strings":["Department of Computer Science and Information Engineering, Tamkang University, New Taipei City, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Tamkang University, New Taipei City, Taiwan","institution_ids":["https://openalex.org/I107470533"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5040420733"],"corresponding_institution_ids":["https://openalex.org/I154864474"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.09485811,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"14","issue":null,"first_page":"505","last_page":"510"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.8576033115386963},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7876203060150146},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.694244384765625},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6701678037643433},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.643775999546051},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6338733434677124},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5403239727020264},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5369853973388672},{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.4280482530593872},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4227713346481323},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3390839099884033},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.19119343161582947}],"concepts":[{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.8576033115386963},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7876203060150146},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.694244384765625},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6701678037643433},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.643775999546051},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6338733434677124},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5403239727020264},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5369853973388672},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.4280482530593872},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4227713346481323},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3390839099884033},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.19119343161582947},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iwcmc.2014.6906408","is_oa":true,"landing_page_url":"https://doi.org/10.1109/iwcmc.2014.6906408","pdf_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6906408","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:tkuir.lib.tku.edu.tw:987654321/118542","is_oa":false,"landing_page_url":"https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/118542","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"doi:10.1109/iwcmc.2014.6906408","is_oa":true,"landing_page_url":"https://doi.org/10.1109/iwcmc.2014.6906408","pdf_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6906408","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.4300000071525574,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1989829552.pdf","grobid_xml":"https://content.openalex.org/works/W1989829552.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1505423956","https://openalex.org/W1569083856","https://openalex.org/W1975067562","https://openalex.org/W2006921752","https://openalex.org/W2064306882","https://openalex.org/W2101591916","https://openalex.org/W2103056119","https://openalex.org/W2106330067","https://openalex.org/W2115709042","https://openalex.org/W2117797270","https://openalex.org/W2152924492","https://openalex.org/W2158727949","https://openalex.org/W2172174332","https://openalex.org/W6630129933","https://openalex.org/W6634010886","https://openalex.org/W6671828919","https://openalex.org/W6685005852"],"related_works":["https://openalex.org/W1969405252","https://openalex.org/W1588782201","https://openalex.org/W2099275250","https://openalex.org/W1586825360","https://openalex.org/W2737741652","https://openalex.org/W2073830730","https://openalex.org/W2149879515","https://openalex.org/W2244007585","https://openalex.org/W2354573973","https://openalex.org/W2390438742"],"abstract_inverted_index":{"Nowadays,":[0],"the":[1,39,68,94,113],"design":[2],"of":[3,41,62,93,115],"a":[4,24,31,54],"secure":[5],"access":[6,17],"authentication":[7,50],"protocol":[8,36],"in":[9,53,80],"heterogeneous":[10],"networks":[11],"achieving":[12],"seamless":[13],"roaming":[14],"across":[15],"radio":[16],"technologies":[18],"for":[19],"mobile":[20],"users":[21],"(MUs)":[22],"is":[23,51,108],"major":[25],"technical":[26],"challenge.":[27],"This":[28],"paper":[29],"proposes":[30],"Distributed":[32],"Anonymous":[33],"Authentication":[34],"(DAA)":[35],"to":[37],"resolve":[38],"problems":[40],"heavy":[42],"signaling":[43,47,85],"overheads":[44],"and":[45,60,99,105],"long":[46],"delay":[48],"when":[49],"executed":[52],"centralized":[55],"manner.":[56],"By":[57],"applying":[58],"MUs":[59,88],"point":[61],"attachments":[63],"(PoAs)":[64],"as":[65],"group":[66,70],"members,":[67],"adopted":[69],"signature":[71],"algorithms":[72],"provide":[73],"identity":[74],"verification":[75],"directly":[76],"without":[77],"sharing":[78],"secrets":[79],"advance,":[81],"which":[82],"significantly":[83],"reduces":[84],"overheads.":[86],"Moreover,":[87],"sign":[89],"messages":[90],"on":[91],"behalf":[92],"group,":[95],"so":[96],"that":[97],"anonymity":[98],"unlinkability":[100],"against":[101],"PoAs":[102],"are":[103],"provided":[104],"thus":[106],"privacy":[107],"preserved.":[109],"Performance":[110],"analysis":[111],"confirm":[112],"advantages":[114],"DAA":[116],"over":[117],"existing":[118],"solutions.":[119]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
