Precision synchronization of computer network clocks
ACM SIGCOMM Computer Communication Review
Adaptive hybrid clock discipline algorithm for the network time protocol
IEEE/ACM Transactions on Networking (TON)
A Secure Fault-Tolerant Conference-Key Agreement Protocol
IEEE Transactions on Computers
Clock synchronization for wireless local area networks
Euromicro-RTS'00 Proceedings of the 12th Euromicro conference on Real-time systems
Efficient authentication and key distribution in wireless IP networks
IEEE Wireless Communications
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
Anonymous channel and authentication in wireless communications
Computer Communications
An authentication technique based on distributed security management for the global mobility network
IEEE Journal on Selected Areas in Communications
New mutual agreement protocol to secure mobile RFID-enabled devices
Information Security Tech. Report
Enhanced delegation-based authentication protocol for PCSs
IEEE Transactions on Wireless Communications
Improved delegation-based authentication protocol for secure roaming service with unlinkability
IEEE Communications Letters
Provably secure and efficient authentication techniques for the global mobility network
Journal of Systems and Software
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Numerous authentication approaches have been proposed recently for the global mobility network (GLOMONET), which provides mobile users with global roaming services. In these authentication schemes, the home network operators can easily obtain the authentication key and wiretap the confidentiality between the roaming user and the visited network. This investigation provides a solution of authentication techniques for GLOMONET in order to prevent this weakness from happening and presents a secure authentication protocol for roaming services. In addition, a round-efficient version of the same authentication protocol is presented. Comparing with other related approaches, the proposed authentication protocol involves fewer messages and rounds in communication.