Undeniable billing in mobile communication
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Security and fraud detection in mobile and wireless networks
Handbook of wireless networks and mobile computing
Authentication of Mobile Users in Third Generation Mobile Systems
Wireless Personal Communications: An International Journal
Accelerating Key Establishment Protocols for Mobile Communication
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
A Fast Authentication Method for Secure and Seamless Handoff
ICOIN '02 Revised Papers from the International Conference on Information Networking, Wireless Communications Technologies and Network Applications-Part II
Classification of Authentication Protocols: A Practical Approach
ISW '00 Proceedings of the Third International Workshop on Information Security
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication
Wireless Personal Communications: An International Journal
Computer Networks: The International Journal of Computer and Telecommunications Networking
A PK-SIM card based end-to-end security framework for SMS
Computer Standards & Interfaces
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
Hi-index | 0.00 |
Mutual authentication and session key exchange protocols based on certificates for the wireless mobile communication/computing system are proposed. First, two improved versions for the conventional certificate-based systems are proposed, and an offline authentication mechanism based on the dynamic certificate is introduced. Then, an end-to-end internetwork-authenticated session key exchange protocol, which preserves a private communication between two mobile users, is finally proposed. In designing the security protocols proposed, the low computational power of the mobile stations and the low bandwidth of the wireless networks are considered