ACM Transactions on Computer Systems (TOCS)
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Third Generation Mobile Communication Systems
Third Generation Mobile Communication Systems
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
A new authentication protocol for UMTS mobile networks
EURASIP Journal on Wireless Communications and Networking
WMCSA '94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications
TK-AKA: using temporary key on authentication and key agreement protocol on UMTS
International Journal of Network Management
A cocktail protocol with the Authentication and Key Agreement on the UMTS
Journal of Systems and Software
Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS
IEEE Communications Letters
IEEE Transactions on Wireless Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Provably secure and efficient authentication techniques for the global mobility network
Journal of Systems and Software
A new delegation-based authentication protocol for use in portable communication systems
IEEE Transactions on Wireless Communications
Security analysis and enhancements of 3GPP authentication and key agreement protocol
IEEE Transactions on Wireless Communications
Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks
IEEE Transactions on Wireless Communications
Anonymous and Authenticated Key Exchange for Roaming Networks
IEEE Transactions on Wireless Communications
An Efficient Mobile Authentication Scheme for Wireless Networks
IEEE Transactions on Wireless Communications
The quest for personal control over mobile location privacy
IEEE Communications Magazine
Privacy and authentication on a portable communications system
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
User privacy is a notable security issue in wireless communications support roaming. However, the mobile authentication schemes existing in the literature cannot achieve this goal in an efficient way. In this paper, we propose a novel lightweight authentication scheme with anonymity and unlinkability for roaming service in large-scale wireless networks. Moreover, we formally analyse our proposed scheme with the BAN-logic and show that it can withstand the several possible attacks.