Research Article
Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks
Table 1
Security comparisons of four protocols.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
P1, P2, P3, P4, P5, and P6 denote mutual authentication, user anonymity with nontraceability, session key update, conditional privacy preserving, session key establishment, and user revocation, respectively. |