ACM Transactions on Computer Systems (TOCS)
Scalable, secure, mobile computing with location information
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Security planning for personal communications
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Optimal privacy and authentication on a portable communications system
ACM SIGOPS Operating Systems Review
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Security Aspects of Mobile Communications
Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course
Undeniable billing in mobile communication
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
An Enhanced Authentication Protocol for Personal Communication Systems
ASSET '98 Proceedings of the 1998 IEEE Workshop on Application - Specific Software Engineering and Technology
A server-aided signature scheme for mobile commerce
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
WiSec '08 Proceedings of the first ACM conference on Wireless network security
A self-verification authentication mechanism for mobile satellite communication systems
Computers and Electrical Engineering
How to secure multi-domain wireless mesh networks
Wireless Networks
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
Performance of an enhanced GSM protocol supporting non-repudiation of service
Computer Communications
Hi-index | 0.00 |
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of the communication should be enciphered and mutual authentication should be conducted between the subscriber and the serving network. Several protocols have been proposed by standards bodies and independent researchers in recent years to counteract these threats. However, the strength of these protocols is usually weakened in the roaming environment where the security breach of a visited network could lead to persistent damages to subscribers who visit. The subscriber's identity is not well protected in most protocols, and appropriate mechanisms solving disputes on roaming bills are not supported either. To solve these problems, new authentication protocols are proposed in this paper with new security features that have not been fully explored before.