메뉴 건너뛰기




Volumn 4, Issue 1, 2005, Pages 57-64

A new delegation-based authentication protocol for use in portable communication systems

Author keywords

Cryptography; Delegation; Portable communication systems (PCSs); Proxy signature

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; RANDOM ACCESS STORAGE; ROM; SECURITY OF DATA;

EID: 19944362854     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2004.840220     Document Type: Article
Times cited : (68)

References (17)
  • 2
    • 19944387714 scopus 로고    scopus 로고
    • An elliptic curve cryptography based authentication and key agreement protocol for wireless communication
    • Dallas, TX, Oct. 30
    • M. Aydos, B. Sunar, and C. K. Koc, "An elliptic curve cryptography based authentication and key agreement protocol for wireless communication," in Proc. 2nd Int. Workshop Discrete Algorithms Meth. Mobile Comput. Commun., Dallas, TX, Oct. 30, 1998, pp. 1-12.
    • (1998) Proc. 2nd Int. Workshop Discrete Algorithms Meth. Mobile Comput. Commun. , pp. 1-12
    • Aydos, M.1    Sunar, B.2    Koc, C.K.3
  • 3
    • 0027641891 scopus 로고
    • Privacy and authentication on a portable communications system
    • Aug.
    • M. J. Beller, L. F. Chang, and Y. Yacobi, "Privacy and authentication on a portable communications system," IEEE J. Sel. Areas Commun., vol. 11, pp. 821-829, Aug. 1993.
    • (1993) IEEE J. Sel. Areas Commun. , vol.11 , pp. 821-829
    • Beller, M.J.1    Chang, L.F.2    Yacobi, Y.3
  • 5
    • 0032676481 scopus 로고    scopus 로고
    • Enhanced privacy and authentication for the GSM
    • C. H. Lee, M. S. Hwang, and W. P. Yang, "Enhanced privacy and authentication for the GSM," Wireless Networks, vol. 5, pp. 231-243, 1999.
    • (1999) Wireless Networks , vol.5 , pp. 231-243
    • Lee, C.H.1    Hwang, M.S.2    Yang, W.P.3
  • 6
    • 3042522479 scopus 로고    scopus 로고
    • Efficient proxy-protected proxy signature scheme based on discrete logarithm
    • Taiwan, May
    • W. B. Lee and C. Y. Chang, "Efficient proxy-protected proxy signature scheme based on discrete logarithm," in Proc. 10th Conf. Inform. Security, Taiwan, May 2000, pp. 4-7.
    • (2000) Proc. 10th Conf. Inform. Security , pp. 4-7
    • Lee, W.B.1    Chang, C.Y.2
  • 7
    • 0032678890 scopus 로고    scopus 로고
    • Security and authentication in PCS
    • H. Y. Lin, "Security and authentication in PCS," Comput. Elect. Eng., vol. 25, no. 4, pp. 225-248, 1999.
    • (1999) Comput. Elect. Eng. , vol.25 , Issue.4 , pp. 225-248
    • Lin, H.Y.1
  • 8
    • 0033332268 scopus 로고    scopus 로고
    • Secure communication mechanisms for GSM networks
    • Nov.
    • C. C. Lo and Y. J. Chen, "Secure communication mechanisms for GSM networks," IEEE Trans. Consum. Electron., vol. 45, pp. 1074-1080, Nov. 1999.
    • (1999) IEEE Trans. Consum. Electron. , vol.45 , pp. 1074-1080
    • Lo, C.C.1    Chen, Y.J.2
  • 9
    • 0030231965 scopus 로고    scopus 로고
    • Delegation of the power to sign messages
    • Sep.
    • M. Mambo, K. Usuda, and E. Okamoto, "Delegation of the power to sign messages," IEICE Trans. Fundamentals, vol. E79-A, no. 9, pp. 1338-1353, Sep. 1996.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1353
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 10
    • 0032163788 scopus 로고    scopus 로고
    • Key distribution for secure VSAT satellite communications
    • Sep.
    • J. H. Park and S. B. Lim, "Key distribution for secure VSAT satellite communications," IEEE Trans. Broadcast., vol. 44, pp. 274-277, Sep. 1998.
    • (1998) IEEE Trans. Broadcast. , vol.44 , pp. 274-277
    • Park, J.H.1    Lim, S.B.2
  • 11
    • 84944291851 scopus 로고
    • Overview of the GSM system and protocol architecture
    • Apr.
    • M. Rahnema, "Overview of the GSM system and protocol architecture," IEEE Commun. Mag., pp. 92-100, Apr. 1993.
    • (1993) IEEE Commun. Mag. , pp. 92-100
    • Rahnema, M.1
  • 12
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public-key cryptosystem
    • Feb.
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signature and public-key cryptosystem," in Commun. ACM, vol. 21, Feb. 1978, pp. 120-126.
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 13
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password authentication with insecure communication," in Commun. ACM, vol. 24, 1981, pp. 770-772.
    • (1981) Commun. ACM , vol.24 , pp. 770-772
    • Lamport, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.