Jian-Zhu Lu

Learn More
Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the scheme can effectively defend all known attacks to mobile networks including the denial-of-service attack. This article shows an existential replication attack on the scheme and, as a result, an attacker can obtain the communication key between a mobile(More)
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, design issues for efficient and secure biometrics-based remote user authentication scheme have been extensively investigated by research community in these years.(More)
Remote user authentications are an essential tool for e-commerce in Internet environment. In these systems, identity privacy is provided by concealing user's identity. In this article, we introduce the identity privacy study of this setting, and explore a secure and efficient dynamic ID-based remote user authentication protocol with untraceability. We adapt(More)
In 2008, Tang and Wu designed a one-time alias mechanism for protecting the mobile privacy of a user. Recently, Youn and Lim proposed an improved delegation-based authentication protocol to provide private roaming service. In this article, we show that a link between requests may disclose information about the mobile privacy of a sender, and that the(More)
  • 1