Access control protocols with two-layer architecture for wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient, anonymous, and authenticated conference key setup in cellular wireless networks
Computers and Electrical Engineering
Anonymous channel and authentication in wireless communications
Computer Communications
Conference key distribution schemes for portable communication systems
Computer Communications
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
MNPA: a mobile network privacy architecture
Computer Communications
International Journal of Electronic Security and Digital Forensics
Scalable and efficient mobile authentication scheme preserving user privacy
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.07 |
Public-key/private-key hybrid key agreements and authentication protocols which maintain privacy of conversation and location information, and deter usage fraud, are presented. These protocols are optimized for low complexity in the portable unit and network infrastructure. The basic cryptographic techniques are described, and some complexity information obtained from these laboratory experiments and from other sources are presented. The three public-key protocols described have differing levels of security and complexity: and the tradeoffs are discussed. Because of the complexity concerns mentioned above, the public-key protocols are compared to a representative private-key approach in the areas of both security and computational complexity