Handbook of Applied Cryptography
Handbook of Applied Cryptography
Finite-state analysis of SSL 3.0
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Wireless sales force automation: concept and cases
International Journal of Mobile Communications
Building a wireless network infrastructure under budget constraints
International Journal of Mobile Communications
A mobile agent protected scheme using pairing-based cryptosystems
International Journal of Mobile Communications
Security model for Intra-Domain Mobility Management Protocol
International Journal of Mobile Communications
Can mobile services facilitate commerce? Findings from the Greek telecommunications market
International Journal of Mobile Communications
International Journal of Mobile Communications
Mobile commerce and electronic commerce in Thailand: a value space analysis
International Journal of Mobile Communications
Consumer perception and attitude toward mobile communication
International Journal of Mobile Communications
International Journal of Mobile Communications
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
An authentication technique based on distributed security management for the global mobility network
IEEE Journal on Selected Areas in Communications
User characteristics and performance with automated mobile phone systems
International Journal of Mobile Communications
Secure ICT services for mobile and wireless communications
International Journal of Mobile Communications
Anonymous authentication scheme for wireless communications
International Journal of Mobile Communications
International Journal of Mobile Communications
A novel and low-computation e-cash transfer system against blackmail for mobile communications
International Journal of Mobile Communications
Hi-index | 0.00 |
In 2004, Long et al. proposed a new public key certification structure to implement a localised authentication scheme by modifying the SSL protocol v3.0. Their scheme keeps the user's identity concealed and minimises the influence of the home network's failure and the overhead of having the legal user authenticated by its home network. Unfortunately, the privacy of the roaming user and the round efficiency in Long et al.'s scheme are doubted. In this paper, the authors present an improved version conserving the advantages of Long et al.'s scheme, ensuring round efficiency and providing both mutual authentication and key agreement.