메뉴 건너뛰기




Volumn 15, Issue 4, 1999, Pages 505-520

Efficient authentication protocol for mobile networks

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; COMPUTER NETWORKS; DATA COMMUNICATION SYSTEMS; INTERNET; MOBILE COMPUTING; SECURITY OF DATA; TELECOMMUNICATION SERVICES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 0032643561     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (32)

References (19)
  • 1
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham, "Prudent engineering practice for cryptographic protocols," IEEE Transactions on Software Engineering, Vol. 22, No. 1, 1996, pp. 6-15.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 2
    • 0000874415 scopus 로고
    • Limitations of the kerberos authentication system
    • October
    • S. M. Bellovin and M. Merritt, "Limitations of the kerberos authentication system," ACM Communications Review, Vol. 20, No. 5, October 1990, pp. 119-132.
    • (1990) ACM Communications Review , vol.20 , Issue.5 , pp. 119-132
    • Bellovin, S.M.1    Merritt, M.2
  • 3
    • 0027617333 scopus 로고
    • Systematic design of a family of attack-resistant authentication protocols
    • R. Bird, et al., "Systematic design of a family of attack-resistant authentication protocols, " IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993, pp. 679-693.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5 , pp. 679-693
    • Bird, R.1
  • 5
    • 0345630819 scopus 로고
    • Technical Report, 94-47 Communication Department, CyberSafe Corporation
    • "Deploying kerberos for large organizations," Technical Report, 94-47 Communication Department, CyberSafe Corporation, 1994.
    • (1994) Deploying Kerberos for Large Organizations
  • 6
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D. E. Denning and G. M. Sacco, "Timestamps in key distribution protocols," Communications of the ACM, Vol. 24, No. 8, 1981, pp. 533-536.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 7
    • 0003370741 scopus 로고
    • A security risk of depending on synchronized clocks
    • L. Gong, "A security risk of depending on synchronized clocks," ACM Operating Systems Review, Vol. 26, No. 1, 1992, pp. 49-53.
    • (1992) ACM Operating Systems Review , vol.26 , Issue.1 , pp. 49-53
    • Gong, L.1
  • 8
    • 84890788516 scopus 로고    scopus 로고
    • Wireless LAN medium access control (MAC) and physical layer (PHY) specifications
    • IEEE Standard 802.11, "Wireless LAN medium access control (MAC) and physical layer (PHY) specifications," IEEE Draft Standard, 1996.
    • (1996) IEEE Draft Standard
  • 9
    • 0038824488 scopus 로고
    • An efficient and secure authentication protocol using uncertified keys
    • I. L. Kao and R. Chow, "An efficient and secure authentication protocol using uncertified keys," ACM Operating Systems Review, Vol. 29, No. 3, 1995, pp. 14-21.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 14-21
    • Kao, I.L.1    Chow, R.2
  • 11
    • 0002494222 scopus 로고
    • A nonce-based protocol for multiple authentication
    • A. Kehne, et al., "A nonce-based protocol for multiple authentication," ACM Operating Systems Review, Vol. 26, No. 4, 1992, pp. 84-89.
    • (1992) ACM Operating Systems Review , vol.26 , Issue.4 , pp. 84-89
    • Kehne, A.1
  • 15
    • 0002088427 scopus 로고
    • A note on the use of timestamps as nonces
    • B. C. Neuman and S. G. Stubblebine, "A note on the use of timestamps as nonces," ACM Operating Systems Review, Vol. 27, No. 2, 1993, pp. 10-14.
    • (1993) ACM Operating Systems Review , vol.27 , Issue.2 , pp. 10-14
    • Neuman, B.C.1    Stubblebine, S.G.2
  • 18
    • 0002796093 scopus 로고
    • On key distribution protocols for repeated authentication
    • Paul Syverson, "On key distribution protocols for repeated authentication," ACM Operating Systems Review, Vol. 27, No. 4, 1993, pp. 10-14.
    • (1993) ACM Operating Systems Review , vol.27 , Issue.4 , pp. 10-14
    • Syverson, P.1
  • 19
    • 2742584770 scopus 로고    scopus 로고
    • An authentication and key distribution system for open network systems
    • S. P. Shieh and W. H. Yang, "An authentication and key distribution system for open network systems," ACM Operating Systems Review, Vol. 30, No. 2, 1996, pp. 32-41.
    • (1996) ACM Operating Systems Review , vol.30 , Issue.2 , pp. 32-41
    • Shieh, S.P.1    Yang, W.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.