Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
Untraceable mobility or how to travel incognito
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
MIXes in Mobile Communication Systems: Location Management with Privacy
Proceedings of the First International Workshop on Information Hiding
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Location privacy for cellular systems; analysis and solution
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
An introduction to access security in UMTS
IEEE Wireless Communications
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
Privacy Enhanced Mobile Authentication
Wireless Personal Communications: An International Journal
Improved authentication algorithm for UMTS
Proceedings of the 2009 International Conference on Hybrid Information Technology
Hi-index | 0.00 |
The 3G cellular access security architectures do not provide satisfactorily user privacy and fail to fully include all three principal entities involved in the security context. In this paper we propose a beyond-3G Privacy Enhanced 3-Way Authentication and Key Agreement (PE3WAKA) protocol that provides substantially improved user privacy and a 3-way security context. By integrating selected Mobility Management procedures and the PE3WAKA protocol this is achieved with fewer round-trips than the 3G equivalent.