Optimal privacy and authentication on a portable communications system
ACM SIGOPS Operating Systems Review
On the design of security protocols for mobile communications
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy
AKA Protocols for Mobile Communications
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Security analysis and applications of standard key agreement protocols
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Hi-index | 0.01 |
Recently, the development of mobile communication technology, the mobile terminal users are increasing. In the mobile environment, the security service is very important to provide secure mobile communication, such as mobile electronic-commerce. The security of information is significant to provide secure electronic commerce in mobile communications. Therefore, the security services must be provided in a mobile communication environment. However, the mobile communication environment has some disadvantages, because it has low capacity of power, low performance of CPU and limited memory, etc. In this paper, we propose an efficient key distribution protocol for mobile communications.