Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Authentication of Mobile Users in Third Generation Mobile Systems
Wireless Personal Communications: An International Journal
Identity-Based and Self-Certified Key-Exchange Protocols
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
Authentication and Payment in Future Mobile Systems
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Open problems in number theoretic complexity, II
ANTS-I Proceedings of the First International Symposium on Algorithmic Number Theory
A note on Girault's self-certified model
Information Processing Letters
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
An authentication technique based on distributed security management for the global mobility network
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network (GLOMONET). The proposed protocols have new features, such as identity anonymity and one-time session key progression. Identity anonymity protects mobile users' privacy in the roaming network environment. One-time session key progression frequently renews the session key for mobile users and reduces the risk of using a compromised session key to communicate with visited networks. It is shown that the computation complexity of the proposed protocols is similar to the existing one appeared in the literature, while the security has been significantly enhanced.