Password authentication with insecure communication
Communications of the ACM
A New Authentication Protocol for GSM Networks
LCN '98 Proceedings of the 23rd Annual IEEE Conference on Local Computer Networks
Private Authentication Techniques for the Global Mobility Network
Wireless Personal Communications: An International Journal
A new delegation-based authentication protocol for use in portable communication systems
IEEE Transactions on Wireless Communications
Security analysis and enhancements of 3GPP authentication and key agreement protocol
IEEE Transactions on Wireless Communications
A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems
International Journal of Ad Hoc and Ubiquitous Computing
Improved delegation-based authentication protocol for secure roaming service with unlinkability
IEEE Communications Letters
Preventing delegation-based mobile authentications from man-in-the-middle attacks
Computer Standards & Interfaces
International Journal of Electronic Security and Digital Forensics
International Journal of Information Security and Privacy
Double Delegation-Based Authentication and Key Agreement Protocol for PCSs
Wireless Personal Communications: An International Journal
Hi-index | 0.01 |
Lee and Yeh recently presented a delegation-based authentication protocol for portable communication systems (PCSs), which is claimed to provide non-repudiation in on-line authentication. This investigation indicates that their protocol has a weakness in that a malicious visited location register can forge the authentication messages in off-line authentication processes, preventing mobile users from obtaining non-repudiation in such processes. This study also presents an enhanced protocol, which not only has the same security properties as the original protocol but also avoids the weakness in the original scheme and reduces the computational cost.