메뉴 건너뛰기




Volumn 29, Issue 6, 2007, Pages 647-652

An enhanced authenticated key agreement protocol for wireless mobile communication

Author keywords

3GPP2; Authenticated key agreement; Off line password guessing attack; Wireless mobile communication

Indexed keywords

AUTHENTICATION; BANDWIDTH; CRYPTOGRAPHY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 34548132736     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2007.04.002     Document Type: Article
Times cited : (25)

References (16)
  • 1
    • 0026850091 scopus 로고
    • Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks
    • Bellovin S., and Merritt M. Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks. Proc. of the Symposium on Security and Privacy (1992) 72-84
    • (1992) Proc. of the Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.1    Merritt, M.2
  • 2
    • 0027741529 scopus 로고
    • Augmented Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks and Password File Compromise
    • ACM Press
    • Bellovin S., and Merritt M. Augmented Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks and Password File Compromise. Proc. of the 1st CCS (1993), ACM Press 244-250
    • (1993) Proc. of the 1st CCS , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 3
    • 84937550984 scopus 로고
    • Provably secure password authenticated key exchange using Diffie-Hellman
    • Advances in Cryptology Eurocrypt '00, Springer, Berlin
    • Boyko V., MacKenzie P., and Patel S. Provably secure password authenticated key exchange using Diffie-Hellman. Advances in Cryptology Eurocrypt '00. Lecture Notes in Computer Science vol. 1807 (1985), Springer, Berlin 156-171
    • (1985) Lecture Notes in Computer Science , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 4
    • 84873466407 scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Advances in Cryptology Eurocrypt '00, Springer, Berlin
    • Bellare M., Pointcheval D., and Rogaway P. Authenticated key exchange secure against dictionary attacks. Advances in Cryptology Eurocrypt '00. Lecture Notes in Computer Science vol. 1807 (1985), Springer, Berlin 139-155
    • (1985) Lecture Notes in Computer Science , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 5
    • 33747171940 scopus 로고    scopus 로고
    • The importance of proofs of security for key establishment protocols: formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols
    • Choo K.-K.R., Boyd C., and Hitchcock Y. The importance of proofs of security for key establishment protocols: formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. Computer Communications 29 15 (2006) 2788-2797
    • (2006) Computer Communications , vol.29 , Issue.15 , pp. 2788-2797
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 7
    • 27744498991 scopus 로고    scopus 로고
    • A new efficient authentication protocol for mobile networks
    • Hwang R., and Su F. A new efficient authentication protocol for mobile networks. Computer Standards and Interfaces 28 2 (2005) 241-252
    • (2005) Computer Standards and Interfaces , vol.28 , Issue.2 , pp. 241-252
    • Hwang, R.1    Su, F.2
  • 8
    • 34548141100 scopus 로고    scopus 로고
    • 3GPP2 N.S001 v1.0, OTASP and OTAPA, available at: http://www.3gpp2.org Jan. 1999.
  • 9
    • 34548141083 scopus 로고    scopus 로고
    • 3GPP2 C.S0016-B v1.0, Over-the-Air Service Provisioning of mobile stations in spread spectrum standards, available at: http://www.3gpp2.org Oct. 2002.
  • 10
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation 48 177 (1987) 203-209
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 11
    • 34548135536 scopus 로고    scopus 로고
    • Off-line password guessing attack on an efficient key agreement protocol for secure authentication
    • Lu R., and Cao Z. Off-line password guessing attack on an efficient key agreement protocol for secure authentication. International Journal of Network Security 3 1 (2006) 35-38
    • (2006) International Journal of Network Security , vol.3 , Issue.1 , pp. 35-38
    • Lu, R.1    Cao, Z.2
  • 12
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Advances in Cryptology - Crypto 85, Springer, Berlin
    • Miller V.S. Use of elliptic curves in cryptography. Advances in Cryptology - Crypto 85. Lecture Notes in Computer Science vol. 128 (1985), Springer, Berlin 417-426
    • (1985) Lecture Notes in Computer Science , vol.128 , pp. 417-426
    • Miller, V.S.1
  • 16
    • 0032658583 scopus 로고    scopus 로고
    • Simple authenticated key agreement algorithm
    • Seo D., and Sweeney P. Simple authenticated key agreement algorithm. Electronics Letters 35 13 (1999) 1073-1074
    • (1999) Electronics Letters , vol.35 , Issue.13 , pp. 1073-1074
    • Seo, D.1    Sweeney, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.