메뉴 건너뛰기




Volumn , Issue , 2007, Pages 2720-2725

Efficient 3GPP authentication and key agreement with robust user privacy protection

Author keywords

Authentication; Key agreement; Privacy protection; Third generation wireless communications; Wireless security

Indexed keywords

AUTHENTICATION; BANDWIDTH; NETWORK SECURITY; PROBLEM SOLVING; USER INTERFACES;

EID: 36348954010     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNC.2007.505     Document Type: Conference Paper
Times cited : (18)

References (17)
  • 1
    • 85089793376 scopus 로고    scopus 로고
    • rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3G Security, Cryptographic Algorithm Requirements (Release 6), 3GPP TS 33.105 V6.0.0, 2004.
    • rd Generation Partnership Project, "Technical Specification Group Services and System Aspects, 3G Security, Cryptographic Algorithm Requirements (Release 6)," 3GPP TS 33.105 V6.0.0, 2004.
  • 2
    • 85089792943 scopus 로고    scopus 로고
    • rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3G Security, Report on the Evaluation of 3GPP Standard Confidentiality and Integrity Algorithm (Release 1999), 3GPP TS 33.909 Vl.0.0, 2000.
    • rd Generation Partnership Project, "Technical Specification Group Services and System Aspects, 3G Security, Report on the Evaluation of 3GPP Standard Confidentiality and Integrity Algorithm (Release 1999)," 3GPP TS 33.909 Vl.0.0, 2000.
  • 3
    • 85089792163 scopus 로고    scopus 로고
    • rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3G Security, Security Architecture (Release 5), 3GPP TS 33.102 V5.5.0, 2004.
    • rd Generation Partnership Project, "Technical Specification Group Services and System Aspects, 3G Security, Security Architecture (Release 5)," 3GPP TS 33.102 V5.5.0, 2004.
  • 4
    • 0028272762 scopus 로고
    • Privacy and Authentication for Wireless Local Area networks
    • A. Aziz, W. Diffie, "Privacy and Authentication for Wireless Local Area networks," IEEE Personal Commun., Vol. 1, pp. 25-31, 1994.
    • (1994) IEEE Personal Commun , vol.1 , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 6
    • 0027641891 scopus 로고
    • Privacy and Authentication on a Portable Communication System
    • M. Beller, L. Chang, Y. Yacobi, "Privacy and Authentication on a Portable Communication System," IEEE J. Sel. Areas Commun., Vol. 11, pp. 821-829, 1993.
    • (1993) IEEE J. Sel. Areas Commun , vol.11 , pp. 821-829
    • Beller, M.1    Chang, L.2    Yacobi, Y.3
  • 7
    • 0027589399 scopus 로고
    • Fully-fledged Two-way Pubic Key Authentication and Key Agreement for Low-cost Terminals
    • M. Beller, Y. Yacobi, "Fully-fledged Two-way Pubic Key Authentication and Key Agreement for Low-cost Terminals," Electron. Lett., Vol. 29, pp. 999-1001, 1993.
    • (1993) Electron. Lett , vol.29 , pp. 999-1001
    • Beller, M.1    Yacobi, Y.2
  • 10
    • 17644390205 scopus 로고    scopus 로고
    • Efficient Authentication Protocols of GSM
    • C. Chang, J. Lee, Y. Chang, "Efficient Authentication Protocols of GSM," Computer Communications, Vol. 28, pp. 921-928, 2005.
    • (2005) Computer Communications , vol.28 , pp. 921-928
    • Chang, C.1    Lee, J.2    Chang, Y.3
  • 11
    • 33745904732 scopus 로고    scopus 로고
    • Efficient User Authentication and Key Agreement in Ubiquitous Computing
    • Proc. of the 2006 International Conference on Computational Science and its Applications
    • W. Juang, "Efficient User Authentication and Key Agreement in Ubiquitous Computing," In Proc. of the 2006 International Conference on Computational Science and its Applications, Lecture Notes in Computer Science 3983, pp. 396405, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3983 , pp. 396405
    • Juang, W.1
  • 12
    • 36349022520 scopus 로고    scopus 로고
    • NIST FIPS PUB 180, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce, Draft, 1993.
    • NIST FIPS PUB 180, "Secure Hash Standard," National Institute of Standards and Technology, U.S. Department of Commerce, Draft, 1993.
  • 13
    • 0032658583 scopus 로고    scopus 로고
    • Simple Authenticated Key Agreement Algorithm
    • D. Seo, P. Sweeney, "Simple Authenticated Key Agreement Algorithm," Electronics Lett., Vol. 35, pp. 1073-1074, 1999.
    • (1999) Electronics Lett , vol.35 , pp. 1073-1074
    • Seo, D.1    Sweeney, P.2
  • 15
    • 11944251256 scopus 로고    scopus 로고
    • Anonymous Wireless Authentication on a Portable Cellular Mobile System
    • S. Wang, "Anonymous Wireless Authentication on a Portable Cellular Mobile System," IEEE Trans. on Computers, Vol. 53,No. 10, pp. 1317-1329, 2004
    • (2004) IEEE Trans. on Computers , vol.53 , Issue.10 , pp. 1317-1329
    • Wang, S.1
  • 16
    • 4243165683 scopus 로고    scopus 로고
    • Cryptanalysis of Simple Authenticated Key Agreement Protocols
    • C. Yang, T. Chang, M. Hwang, "Cryptanalysis of Simple Authenticated Key Agreement Protocols," IEICE Trans. Fundamentals, Vol. E87-A, No. 8, pp. 2174-2176, 2004.
    • (2004) IEICE Trans. Fundamentals , vol.E87-A , Issue.8 , pp. 2174-2176
    • Yang, C.1    Chang, T.2    Hwang, M.3
  • 17
    • 17144430885 scopus 로고    scopus 로고
    • Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol
    • M. Zhang and Y. Fang, "Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol," IEEE Transactions on Wireless Communication, Vol. 4, No. 2, pp. 734-742, 2005.
    • (2005) IEEE Transactions on Wireless Communication , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.1    Fang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.