메뉴 건너뛰기




Volumn 57, Issue 3, 2003, Pages 1507-1511

Concatenated wireless roaming security association and authentication protocol using ID-based cryptography

Author keywords

AAA; ID based Cryptography; Mobile IP

Indexed keywords

ELECTRONIC COMMERCE; INTERNET; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 0042470627     PISSN: 07400551     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (21)
  • 1
    • 0035416626 scopus 로고    scopus 로고
    • Enhancing IP service provision over heterogeneous wireless networks
    • August
    • L. Becchetti and P. Mahonen and L. Munoz "Enhancing IP service Provision over Heterogeneous Wireless Networks," in IEEE Communications Magazine, pp. 74-81, August 2002.
    • (2002) IEEE Communications Magazine , pp. 74-81
    • Becchetti, L.1    Mahonen, P.2    Munoz, L.3
  • 3
    • 0036471916 scopus 로고    scopus 로고
    • An efficient fault tolerance protocol with backup foreign agents in a hierarchical local registration mobile IP
    • Feb.
    • C. S. Hong, K. W. Yim, D. Y. Lee and D. S. Yun "An Efficient Fault tolerance Protocol with Backup Foreign Agents in a Hierarchical local Registration Mobile IP," in ETRI Journal, Vol. 24, No. 1, Feb. 2002.
    • (2002) ETRI Journal , vol.24 , Issue.1
    • Hong, C.S.1    Yim, K.W.2    Lee, D.Y.3    Yun, D.S.4
  • 5
    • 0033363733 scopus 로고    scopus 로고
    • Mobile IP regsitration protocols: A security attack and new secure minimal public-key based authentication
    • June
    • Sufatrio, K. Y. Lam "Mobile IP Regsitration Protocols:A Security Attack and New Secure Minimal Public-Key Based Authentication," in I-SPAN '99, June 1999.
    • (1999) I-SPAN '99
    • Sufatrio, K.Y.L.1
  • 8
    • 85020598353 scopus 로고
    • Identity-base cryptosystems and siganture schemes
    • Proc. of Crypto '84, Springer-Verlag
    • A. Shamir "Identity-base cryptosystems and siganture schemes," in Proc. of Crypto '84, LNCS, vol. 196, pp. 47-53, Springer-Verlag 1985.
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 9
    • 0024135240 scopus 로고
    • Zero-knowledge proofs of identity
    • U. Feige, A. Fiat and A. Shamir"Zero-knowledge proofs of identity," in J. Cryptology, vol. 1, pp. 77-94 1988.
    • (1988) J. Cryptology , vol.1 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 10
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and siganture problems
    • A. Fiat and A. Shamir "How to prove yourself: Practical solutions to identification and siganture problems," in Proc. Crypto '86, pp. 186-194 1986.
    • (1986) Proc. Crypto '86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 11
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairings
    • Proc. of Crypto 2001, Springer-Verlag
    • D. Boneh and M. Franklin "Identity Based Encryption from the Weil Pairings," in Proc. of Crypto 2001, LNCS vol. 2139, pp. 213-229, Springer-Verlag 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 12
    • 33846938928 scopus 로고    scopus 로고
    • An identity-based signature from gap diffie-hellman groups
    • J. C. Cha and J. H. Cheon "An Identity-Based Signature from Gap Diffie-Hellman Groups," in Cryptology ePrint Archive, http://eprint.iacr.org/2002/018/2002.
    • Cryptology ePrint Archive
    • Cha, J.C.1    Cheon, J.H.2
  • 14
    • 0003312487 scopus 로고    scopus 로고
    • Remote authentication dial in user service (RADIUS)
    • Apr.
    • C. Rigney et al. "Remote Authentication Dial In User Service (RADIUS)," in IETF RFC 2138, Apr. 1997.
    • (1997) IETF RFC , vol.2138
    • Rigney, C.1
  • 15
    • 0043161277 scopus 로고    scopus 로고
    • Draft. 〈draft-ietf-aaa-diameter-framework-01.txt〉 Diameter Framework Document
    • P. R. Calhoun, G. Zorn, P. Pan, H. Akhtar "IETF AAA Working Group Internet," Draft. 〈draft-ietf-aaa-diameter-framework-01.txt〉 Diameter Framework Document,in http://www.ietf.org.
    • IETF AAA Working Group Internet
    • Calhoun, P.R.1    Zorn, G.2    Pan, P.3    Akhtar, H.4
  • 17
    • 0004909437 scopus 로고    scopus 로고
    • AAA protocols, authentication, authorization, and accounting for the internet
    • M. Christopher "AAA Protocols, Authentication, Authorization, and Accounting for the Internet," in IEEE Internet Computing November-December 1999.
    • (1999) IEEE Internet Computing November-december
    • Christopher, M.1
  • 18
    • 0003381509 scopus 로고    scopus 로고
    • Cdma2000 wireless data requirements for AAA
    • June
    • T. Hiller et al. "Cdma2000 wireless Data Requirements for AAA, " in RFC 3141, June 2001.
    • (2001) RFC , vol.3141
    • Hiller, T.1
  • 19
    • 0042660301 scopus 로고    scopus 로고
    • IETF mobile IP working group.: Mobile IP authentication. authorization, and accounting requirements
    • S. Glass, T. Hiller, S. Jacobs, C. Perkins "IETF Mobile IP Working Group.: Mobile IP Authentication. Authorization, and Accounting Requirements," in RFC 2977
    • RFC , vol.2977
    • Glass, S.1    Hiller, T.2    Jacobs, S.3    Perkins, C.4
  • 20
    • 0029323309 scopus 로고
    • Improving the performance of reliable transport protocols in mobile computing environments
    • June
    • R. Caceres and L.Iftode, "Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments," in IEEE JSAC, vol. 13, no. 5, 850-57 June 1995.
    • (1995) IEEE JSAC , vol.13 , Issue.5 , pp. 850-857
    • Caceres, R.1    Iftode, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.