ACM Transactions on Computer Systems (TOCS)
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Efficient authentication protocols of GSM
Computer Communications
Efficient user authentication and key agreement in ubiquitous computing
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
An improvement on privacy and authentication in GSM
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Security analysis and enhancements of 3GPP authentication and key agreement protocol
IEEE Transactions on Wireless Communications
Efficient multi-server password authenticated key agreement using smart cards
IEEE Transactions on Consumer Electronics
Privacy and authentication protocol providing anonymous channels in GSM
Computer Communications
International Journal of Mobile Communications
A novel and low-computation e-cash transfer system against blackmail for mobile communications
International Journal of Mobile Communications
Security management in Wireless Sensor Networks for healthcare
International Journal of Mobile Communications
An authentication protocol for low-cost RFID tags
International Journal of Mobile Communications
An effective AKA protocol for UMTS
International Journal of Mobile Communications
An improved authentication protocol for mobile agent device in RFID environment
International Journal of Mobile Communications
Hi-index | 0.00 |
Nowadays, the Global System for Mobile (GSM) communications is used widely by people around the world. However, there are some problems of GSM authentication to be found. In 2004, Choi and Kim proposed an authentication and key agreement scheme with user privacy protection in GSM. They claimed that their scheme can improve some drawbacks of GSM authentication and achieve user privacy protection. But we find that Choi and Kim's (2004) scheme is not able to achieve privacy protection and resist some well-known attacks completely. In this paper, we propose a more efficient GSM authentication and key agreement protocol with robust identity privacy protection.