A taxonomy for key escrow encryption systems
Communications of the ACM
Location management strategies increasing privacy in mobile communication
Information systems security
How to break fraud-detectable key recovery
ACM SIGOPS Operating Systems Review
Second generation mobile and wireless networks
Second generation mobile and wireless networks
Authentication and Payment in Future Mobile Systems
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Key Recovery in Third Generation Wireless Communication Systems
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
New Key Recovery in WAKE Protocol
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Achieving user privacy in mobile networks
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
A new scheme for the location information protection in mobile communication environments
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Hi-index | 0.00 |
Generally, in mobile communication environments, Wireless Authentication and Key Establishment (WAKE) protocols are essential for secure information transmission. Key Recovery (KR) protocols, including WAKE protocols, can enable an authorized third party to gain access to encrypted message data under certain lawful circumstances. However, it is not easy to construct secure and strongly privacy-preserved KR protocols for mobile communication environments due to mobile hardware resources' limitation. In this paper, we propose a security-enhanced KR protocol and then we construct a privacy-enhanced KR protocol, which is based on the security-enhanced KR protocol, for protecting users' location privacy.