Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Authentication and Payment in Future Mobile Systems
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
A Personal Authentication Scheme Using Mobile Technology
ITCC '03 Proceedings of the International Conference on Information Technology: Computers and Communications
IEEE Security and Privacy
Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication
Wireless Personal Communications: An International Journal
Computer Networks: The International Journal of Computer and Telecommunications Networking
A secure and efficient authentication scheme for mobile users
International Journal of Mobile Communications
Adoption of 3G+ services in Finland
International Journal of Mobile Communications
Mobile and wireless networks: services, evolution and issues
International Journal of Mobile Communications
Consumer value creation in mobile banking services
International Journal of Mobile Communications
An efficient wireless transmission method for m-commerce
International Journal of Mobile Communications
Research areas and challenges for mobile information systems
International Journal of Mobile Communications
Mobile communications: global trends in the 21st century
International Journal of Mobile Communications
A framework for delivering secure mobile location information
International Journal of Mobile Communications
Efficient authentication protocols of GSM
Computer Communications
An efficient password authenticated key exchange protocol for imbalanced wireless networks
Computer Standards & Interfaces
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
Privacy and authentication protocol providing anonymous channels in GSM
Computer Communications
Secure human face authentication for mobile e-government transactions
International Journal of Mobile Communications
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Since, wireless networks make mobile users free from tethers that bind them to fixed places, research topics referred to mobile communications recently become popular. The exposure of signal transmission, however, leads to serious security problems in wireless channels. Engineers must be concerned about illegal attacks such as delusive behaviour and eavesdropping when designing network systems. Furthermore, limitations of mobile devices are also crucial challenges to contrive systems. Hence we propose an efficient method for validating the legitimacy of mobile users. Specifically, our scheme preserves the property of anonymity so that the intruder cannot track the movement history of mobile subscribers.