ACM Transactions on Computer Systems (TOCS)
Optimal privacy and authentication on a portable communications system
ACM SIGOPS Operating Systems Review
On key distribution and authentication in mobile radio networks
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Location management strategies increasing privacy in mobile communication
Information systems security
Key Distribution Protocol for Digital Mobile Communication Systems
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
On certificate-based security protocols for wireless mobile communication systems
IEEE Network: The Magazine of Global Internetworking
Security and fraud detection in mobile and wireless networks
Handbook of wireless networks and mobile computing
Capturing industry experience for an effective information security assessment
International Journal of Information Systems and Change Management
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
IEEE Transactions on Wireless Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mutual authentication and key exchange protocols with anonymity property for roaming services
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
International Journal of Network Management
Hi-index | 0.01 |
The goal of the third-generation mobile systems is to provideworldwide operation, enhance service capabilities, andimprove performance over the second-generation mobile systems. Inthis paper, we propose an authentication procedure forthird-generation mobile systems. The authentication procedure is aprotocol suite consisting of two subprotocols: acertificate-based authentication (CBA) protocol and a ticket-basedauthentication (TBA) protocol. Only two parties, MS and VLR, areinvolved in executing our protocol. Our authentication procedureuses both public- and secret-key cryptosystems. Our authenticationprocedure not only provides uniform authentication across domains,but also reduces computational costs in the process of repeatedauthentication. We provide firm proof of our procedure'scorrectness.