{"id":"https://openalex.org/W2023775784","doi":"https://doi.org/10.1109/wcnc.2013.6554844","title":"An efficient authentication protocol with user anonymity for mobile networks","display_name":"An efficient authentication protocol with user anonymity for mobile networks","publication_year":2013,"publication_date":"2013-04-01","ids":{"openalex":"https://openalex.org/W2023775784","doi":"https://doi.org/10.1109/wcnc.2013.6554844","mag":"2023775784"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc.2013.6554844","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2013.6554844","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100633593","display_name":"Huixian Li","orcid":"https://orcid.org/0000-0001-8098-9573"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huixian Li","raw_affiliation_strings":["School of Computer Science and Engineering, Northwestern Polytechnic University, Xian, China","Sch. of Comput. Sci. & Eng., Northwestern Polytech. Univ., Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Northwestern Polytechnic University, Xian, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"Sch. of Comput. Sci. & Eng., Northwestern Polytech. Univ., Xi'an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111172721","display_name":"Yafang Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yafang Yang","raw_affiliation_strings":["School of Computer Science and Engineering, Northwestern Polytechnic University, Xian, China","Sch. of Comput. Sci. & Eng., Northwestern Polytech. Univ., Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Northwestern Polytechnic University, Xian, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"Sch. of Comput. Sci. & Eng., Northwestern Polytech. Univ., Xi'an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038079322","display_name":"Liaojun Pang","orcid":"https://orcid.org/0000-0002-2388-2806"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liaojun Pang","raw_affiliation_strings":["School of Life Sciences and Technology, Xidian University, Xian, China","School of Life Science and Technology, Xidian University , Xi'an , China"],"affiliations":[{"raw_affiliation_string":"School of Life Sciences and Technology, Xidian University, Xian, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Life Science and Technology, Xidian University , Xi'an , China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100633593"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":null,"apc_paid":null,"fwci":2.2865,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.89138525,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"7","issue":null,"first_page":"1842","last_page":"1847"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8332236409187317},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.7583143711090088},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6736738085746765},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.5889145135879517},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5058367252349854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4655305743217468},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.43981409072875977},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.43896743655204773},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.42343753576278687},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.42222797870635986},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.41411077976226807},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.25469881296157837}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8332236409187317},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.7583143711090088},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6736738085746765},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.5889145135879517},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5058367252349854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4655305743217468},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43981409072875977},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.43896743655204773},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.42343753576278687},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.42222797870635986},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.41411077976226807},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25469881296157837}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc.2013.6554844","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2013.6554844","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2016742267","https://openalex.org/W2023462562","https://openalex.org/W2026372279","https://openalex.org/W2026503310","https://openalex.org/W2047392174","https://openalex.org/W2052267638","https://openalex.org/W2094431167","https://openalex.org/W2111433944","https://openalex.org/W2139348068","https://openalex.org/W2166072550"],"related_works":["https://openalex.org/W2093798919","https://openalex.org/W2360010141","https://openalex.org/W2134444393","https://openalex.org/W2107692711","https://openalex.org/W2941888532","https://openalex.org/W2314541983","https://openalex.org/W1949088485","https://openalex.org/W2482813613","https://openalex.org/W2364053809","https://openalex.org/W2354841249"],"abstract_inverted_index":{"Existing":[0],"mobile":[1,29,62,92,106,141],"authentication":[2,30,56,114,138],"protocols":[3,20,31,41,139],"are":[4,16],"low":[5],"in":[6,18,36,82,103],"efficiency,":[7],"because":[8,39,85],"asymmetric":[9],"encryption":[10],"algorithms":[11],"with":[12,58,135],"large":[13],"computational":[14],"overheads":[15],"employed":[17],"these":[19,40,51],"to":[21,49,100],"ensure":[22],"user":[23,59,70,93],"anonymity.":[24],"In":[25,47],"addition,":[26],"the":[27,79,87,91,95,109,123,130,143],"existing":[28,137],"have":[32],"a":[33,116],"long":[34],"delay":[35,80],"fast":[37,83],"reconnection,":[38,84],"may":[42],"suffer":[43],"from":[44,115],"desynchronization":[45],"attacks.":[46],"order":[48],"solve":[50],"problems,":[52],"an":[53],"efficient":[54],"mutual":[55],"protocol":[57,68,125,145],"anonymity":[60,71],"for":[61,140],"networks":[63],"is":[64,98,126,146],"proposed.":[65],"The":[66,120],"proposed":[67,124,144],"ensures":[69],"by":[72,128],"using":[73,129],"one-way":[74],"hash":[75],"function.":[76],"It":[77],"reduces":[78],"time":[81],"once":[86],"session":[88],"key":[89],"between":[90],"and":[94,113,149],"foreign":[96],"agent":[97],"found":[99],"be":[101],"desynchronized":[102],"reconnection":[104],"process,":[105],"users":[107],"start":[108],"process":[110],"of":[111,122],"login":[112],"new":[117],"beginning":[118],"immediately.":[119],"security":[121,132],"proved":[127],"provable":[131],"model.":[133],"Compared":[134],"several":[136],"networks,":[142],"more":[147,150],"secure":[148],"effective.":[151]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
