Handbook of Applied Cryptography
Handbook of Applied Cryptography
Privacy enhanced cellular access security
Proceedings of the 4th ACM workshop on Wireless security
Location privacy for cellular systems; analysis and solution
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
An introduction to access security in UMTS
IEEE Wireless Communications
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
The study on the user authentication protocol in GSM
Proceedings of the 2009 International Conference on Hybrid Information Technology
Hi-index | 0.00 |
In this paper, we investigate location- and identity privacy issues related to the access procedures. The investigation includes subscriber identity management, mobility management at the link layer and the security setup (authentication and key agreement) procedures. The paper also presents a Privacy Enhanced Mobile Authentication and Key Agreement (PEMAKA) protocol that illustrates the concepts and demonstrates that future mobile systems can provide both improved access security and enhanced subscriber privacy.