Scalable, secure, mobile computing with location information
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Authentication protocols for personal communication systems
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
An authentication scheme for mobile satellite communication systems
ACM SIGOPS Operating Systems Review
An efficient authentication protocol for mobile satellite communication systems
ACM SIGOPS Operating Systems Review
New directions in cryptography
IEEE Transactions on Information Theory
Lightweight security for mobile commerce transactions
Computer Communications
Computers and Electrical Engineering
A user friendly authentication scheme with anonymity for wireless communications
Computers and Electrical Engineering
International Journal of Information Security and Privacy
A secure user-friendly authentication scheme with anonymity for wireless communications
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
In order to provide an opportunity to make personal communication as broad as possible, mobile satellite communication systems have recently drawn much attention. However, any communication system raises two major challenging issues: (1) how to determine whether actors are whom they claim to be; and (2) how to protect data against unauthorized disclosure. Although the secret-key cryptosystem (SKC) and the public-key cryptosystem (PKC) have been developed to provide well-defined security services to address these issues each has serous drawbacks while SKC-based authentication schemes have the common demerit that the server which maintains the secret-key table becomes an attractive target for numerous intrusions, PKC-based schemes suffer from the expensive complexity of the public-key infrastructure (PKI) and a high computation overhead. Therefore, in this paper, a self-verification authentication mechanism with lower computation and key management cost is introduced.