A Study of Anonymity in a Mobile Computing Environment

张斌,邬江兴
DOI: https://doi.org/10.3969/j.issn.1000-7180.2003.08.013
2003-01-01
Abstract:The anonymity of mobile user must be considered sufficiently during the authentication of user in a mobile com-puting environment.In this paper,we present a classificationscheme of anonymity of mobile user,give three methods of solv-ing the anonymity of mobile user including shared key method,public key method and hybrid method.Then we analyze these methods,point out the existing problems and propose some im-provement to overcome the constraint of homeless authentica-tion protocol.
What problem does this paper attempt to address?