Password authentication with insecure communication
Communications of the ACM
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Cryptoanalysis of the Cellular Encryption Algorithm
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
NetCard - A Practical Electronic-Cash System
Proceedings of the International Workshop on Security Protocols
Almost optimal hash sequence traversal
FC'02 Proceedings of the 6th international conference on Financial cryptography
Wireless and mobility and their security related issues and enhancements: tutorial presentation
Journal of Computing Sciences in Colleges
Mobile services access and payment through reusable tickets
Computer Communications
An Extended Authentication and Key Agreement Protocol of UMTS
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
TK-AKA: using temporary key on authentication and key agreement protocol on UMTS
International Journal of Network Management
A cocktail protocol with the Authentication and Key Agreement on the UMTS
Journal of Systems and Software
A privacy protecting UMTS AKA protocol providing perfect forward secrecy
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
IEEE/ACM Transactions on Networking (TON)
An effective AKA protocol for UMTS
International Journal of Mobile Communications
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
The security of the current 3G wireless protocols addresses the problems faced by the 2G systems, in addition to fulfilling the higher 3G security requirements mandated from operating in IP networks as well as voice networks. However, the approach adopted by the two most popular 3G mobile system forerunners, UMTS and cdma2000, leaves many areas for improvement. In this paper, we improve the security of the 3G protocols in network access by providing strong periodically mutual authentication, strong key agreement, and non-repudiation service in a simple and elegant way.