메뉴 건너뛰기




Volumn 56, Issue 5, 2002, Pages 293-297

An improvement of mobile users authentication in the integration environments

Author keywords

Authentication; Certificate based; Mobile communication; Security

Indexed keywords

CONGESTION CONTROL (COMMUNICATION); CRYPTOGRAPHY; DATA PRIVACY; MOBILE TELECOMMUNICATION SYSTEMS; PERSONAL COMMUNICATION SYSTEMS; SECURITY OF DATA; ALGORITHMS; COMPUTATIONAL METHODS; NETWORK PROTOCOLS; SIGNAL PROCESSING;

EID: 0036409380     PISSN: 00011096     EISSN: None     Source Type: Journal    
DOI: 10.1078/1434-8411-54100113     Document Type: Article
Times cited : (9)

References (15)
  • 2
    • 0029359261 scopus 로고
    • Techniques for privacy and authentication in personal communication systems
    • Aug.
    • Brown, D.: "Techniques for privacy and authentication in personal communication systems," IEEE Personal Communications, 6-10, Aug. 1995.
    • (1995) IEEE Personal Communications , pp. 6-10
    • Brown, D.1
  • 3
    • 0002378128 scopus 로고
    • Optimal privacy and authentication on a portable communications system
    • July
    • Carlsen, U.: "Optimal privacy and authentication on a portable communications system," ACM Operation System Review, vol. 28, pp. 16-23, July 1994.
    • (1994) ACM Operation System Review , vol.28 , pp. 16-23
    • Carlsen, U.1
  • 7
    • 0029256120 scopus 로고
    • Conference key distribution protocols for digital mobile communication systems
    • Feb.
    • Hwang, M.-S.; Yang, W.P.: "Conference key distribution protocols for digital mobile communication systems," IEEE Journal on Selected Areas in Communications, vol. 13, pp. 416-420, Feb. 1995.
    • (1995) IEEE Journal on Selected Areas in Communications , vol.13 , pp. 416-420
    • Hwang, M.-S.1    Yang, W.P.2
  • 8
    • 0027678720 scopus 로고
    • Scheme for secure digital mobile communications based on symmetric key cryptography
    • Hwang, T.: "Scheme for secure digital mobile communications based on symmetric key cryptography," Information Processing Letters, vol. 48, pp. 35-37, 1993.
    • (1993) Information Processing Letters , vol.48 , pp. 35-37
    • Hwang, T.1
  • 9
    • 0032676481 scopus 로고    scopus 로고
    • Enhanced privacy and authentication for the global system for mobile communications
    • July
    • Lee, C.H.; Hwang, M.-S.; Yang, W.P.: "Enhanced privacy and authentication for the global system for mobile communications," Wireless Networks, vol. 5, pp. 231-243, July 1999.
    • (1999) Wireless Networks , vol.5 , pp. 231-243
    • Lee, C.H.1    Hwang, M.-S.2    Yang, W.P.3
  • 10
    • 0030261212 scopus 로고    scopus 로고
    • Privacy and authentication protocols for PCS
    • Oct.
    • Mohan, S: "Privacy and authentication protocols for PCS," IEEE Personal Communications, vol. 35, pp. 34-38, Oct. 1996.
    • (1996) IEEE Personal Communications , vol.35 , pp. 34-38
    • Mohan, S.1
  • 12
    • 0031234695 scopus 로고    scopus 로고
    • On certificate-based security protocols for wireless mobile communication systems
    • Park, C.S.: "On certificate-based security protocols for wireless mobile communication systems," IEEE Network, pp. 50-57, 1997.
    • (1997) IEEE Network , pp. 50-55
    • Park, C.S.1
  • 14
    • 0011177428 scopus 로고    scopus 로고
    • Authentication of mobile users in the integration environments
    • Kaohsiung, Taiwan, Nov.
    • Tzeng, Z.-J.; Tzeng, W.-G.: "Authentication of mobile users in the integration environments," in International Symposium on Communications (ISCOM'99), pp. 195-199, Kaohsiung, Taiwan, Nov. 1999.
    • (1999) International Symposium on Communications (ISCOM'99) , pp. 195-199
    • Tzeng, Z.-J.1    Tzeng, W.-G.2
  • 15
    • 0002360599 scopus 로고    scopus 로고
    • An optimized protocol for mobile network authentication and security
    • Yi, X.; Okamoto, E.; Lam, K.Y.: "An optimized protocol for mobile network authentication and security," ACM Mobile Computing and Communications Review, vol. 2, no. 3, pp. 37-39, 1998.
    • (1998) ACM Mobile Computing and Communications Review , vol.2 , Issue.3 , pp. 37-39
    • Yi, X.1    Okamoto, E.2    Lam, K.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.