An ElGamal-Like Cryptosystem for Enciphering Large Messages
IEEE Transactions on Knowledge and Data Engineering
Speeding Up Secret Computations with Insecure Auxiliary Devices
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Key Distribution Protocol for Digital Mobile Communication Systems
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
An optimized protocol for mobile network authentication and security
ACM SIGMOBILE Mobile Computing and Communications Review
On certificate-based security protocols for wireless mobile communication systems
IEEE Network: The Magazine of Global Internetworking
Anonymous authentication scheme for wireless communications
International Journal of Mobile Communications
Information Sciences: an International Journal
Hi-index | 0.00 |
As great progress has been made in mobile communications, manyrelated researches on this topic have been proposed. In most ofthe proposed protocols so far, it has been assumed that the personusing the mobile station is the registrar of the SIM card;as a matter of, the previous protocols forauthentication and session key distribution are built upon thisassumption. This way, the mobile user can only verify the identityof the owner of the SIM card. This means that the mobile user canonly know that who registers the SIM card with which hecommunicates. Note that the human voice can be forged. To makesure that the speaker at the other end is the right owner of theSIM card, concept of the password is involved to constructthe end-to-end security authentication protocol. In the proposedprotocol, each mobile user can choose a password. When twomobile users want to communicate with each other, either user canrequest to perform a end-user identification process. Only when bothof the end users input the correct passwords can thecorrect common session key be established.