A practical protocol for large group oriented networks
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Authentication and Payment in Future Mobile Systems
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Threshold DSS Signatures without a Trusted Party
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
PayWord and MicroMint: Two Simple Micropayment Schemes
Proceedings of the International Workshop on Security Protocols
NetCard - A Practical Electronic-Cash System
Proceedings of the International Workshop on Security Protocols
Electronic Payments of Small Amounts
Proceedings of the International Workshop on Security Protocols
Electronic Lottery Tickets as Micropayments
FC '97 Proceedings of the First International Conference on Financial Cryptography
An Efficient Micropayment System Based on Probabilistic Polling
FC '97 Proceedings of the First International Conference on Financial Cryptography
Micropayments via Efficient Coin-Flipping
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Accountable Anonymous Access to Services in Mobile Communication Systems
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Networked Cryptographic Devices Resilient to Capture
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Wireless hotspots: current challenges and future directions
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Secure authentication system for public WLAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Fine-grained control of security capabilities
ACM Transactions on Internet Technology (TOIT)
Reputation-based Wi-Fi deployment protocols and security analysis
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Towards Certificate-Based Authentication for Future Mobile Communications
Wireless Personal Communications: An International Journal
Agora: a minimal distributed protocol for electronic commerce
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Robust threshold DSS signatures
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A PKI-based authentication framework for next generation mobile internet
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Split-and-delegate: threshold cryptography for the masses
FC'02 Proceedings of the 6th international conference on Financial cryptography
Efficient authentication and key distribution in wireless IP networks
IEEE Wireless Communications
Authenticated wireless roaming via tunnels: making mobile guests feel at home
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Efficient mutual authentication for multi-domain RFID systems using distributed signatures
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
AAA for spontaneous roaming agreements in heterogeneous wireless networks
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
In this paper, we show how secret sharing can be used to address a number of shortcomings in state-of-the-art public-key-based inter-provider roaming. In particular, the new concept does not require costly operations for certificate validation by the mobile device. It furthermore eliminates the need for a secure channel between providers upon roaming. We demonstrate the new approach by introducing a new protocol, EAP-TLS-KS, for roaming between 802.11i-protected WLANs. In addition, we show that the properties of EAP-TLS-KS allow for an efficient integration of a micropayment scheme.