A network architecture providing host migration transparency
SIGCOMM '91 Proceedings of the conference on Communications architecture & protocols
IP-based protocols for mobile internetworking
SIGCOMM '91 Proceedings of the conference on Communications architecture & protocols
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Authenticated ad hoc routing at the link layer for mobile systems
Wireless Networks
Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Round-Optimal Contributory Conference Key Agreement
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Computer Standards & Interfaces
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
A Key Management Scheme for Secure Mobile IP Registration Based on AAA Protocol
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
A secure and efficient authentication scheme for mobile users
International Journal of Mobile Communications
Can mobile services facilitate commerce? Findings from the Greek telecommunications market
International Journal of Mobile Communications
International Journal of Mobile Communications
Consumer perception and attitude toward mobile communication
International Journal of Mobile Communications
International Journal of Mobile Communications
Robust and efficient authenticated key agreement in mobile communications
International Journal of Mobile Communications
International Journal of Mobile Communications
A solution to mobile IP registration for AAA
CIC'02 Proceedings of the 7th CDMA international conference on Mobile communications
An Efficient Mobile Authentication Scheme for Wireless Networks
IEEE Transactions on Wireless Communications
New multiparty authentication services and key agreement protocols
IEEE Journal on Selected Areas in Communications
An improved localisation algorithm for performance improvement
International Journal of Mobile Communications
An effective AKA protocol for UMTS
International Journal of Mobile Communications
Hi-index | 0.00 |
There are occasions when some people carry their portable devices to a hotel room or office to hold a short-term conference over wireless networks. This paper designs a user-anonymous and short-term Conference Key Distribution System (CKDS) to ensure secure communications over an open channel and to protect the identities of the users. Furthermore, linker-layer routing between the Mobile Hosts (MHs) makes it possible for MHs to directly communicate with one another. Under the random oracle model and the elliptic curve version of the Computational Diffie-Hellman (CDH) assumption, the proposed system is demonstrated to be provably secure against active adversaries. Compared with previously proposed systems, the proposed system is efficient in terms of communication and computational complexity, and is suitable for low-power mobile devices.