메뉴 건너뛰기




Volumn , Issue , 2007, Pages

A new hybrid approach of symmetric/asymmetric authentication protocol for future mobile networks

Author keywords

3rd generation mobile networks; Authentication mechanism; End to end mobile security and mobile security requirements

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CELLULAR TELEPHONE SYSTEMS; COMMUNICATION SYSTEMS; COMPUTER CRIME; CRYPTOGRAPHY; MOBILE COMPUTING; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; RADIO BROADCASTING; TELECOMMUNICATION SYSTEMS; VIDEO STREAMING; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 47049086007     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIMOB.2007.4390823     Document Type: Conference Paper
Times cited : (9)

References (11)
  • 1
    • 47049093944 scopus 로고    scopus 로고
    • 3G TS 33.102: 3G Security; Security Architecture, htt://www.etsi.org
    • 3G TS 33.102: 3G Security; Security Architecture, htt://www.etsi.org
  • 2
    • 47049106048 scopus 로고    scopus 로고
    • William Stallings, Cryptography and Network Security: Principles and Practice, 3rd, Prentice Hall, 2003.
    • William Stallings, Cryptography and Network Security: Principles and Practice, 3rd, Prentice Hall, 2003.
  • 3
    • 47049122745 scopus 로고    scopus 로고
    • ITU-R Rec. M.687-2, International mobile telecommunications- 2000(IMT-2000),1997.
    • ITU-R Rec. M.687-2, "International mobile telecommunications- 2000(IMT-2000),"1997.
  • 4
    • 47049091110 scopus 로고    scopus 로고
    • ITU-R Rec. M.1078, Security principles for international mobile telecommunications-2000 (IMT-2000), 1997.
    • ITU-R Rec. M.1078, "Security principles for international mobile telecommunications-2000 (IMT-2000)," 1997.
  • 5
    • 47049111851 scopus 로고    scopus 로고
    • ITU-R Rec. M. 1223, Evaluation of security mechanisms for IMT-2000, 1997.
    • ITU-R Rec. M. 1223, "Evaluation of security mechanisms for IMT-2000," 1997.
  • 7
    • 0032678890 scopus 로고    scopus 로고
    • Security and Authentication in PCS
    • July
    • Lin H. Y.," Security and Authentication in PCS," Computers & Electrical Engineering, Volume 25, No. 4, July 1999, pp. 225-248.
    • (1999) Computers & Electrical Engineering , vol.25 , Issue.4 , pp. 225-248
    • Lin, H.Y.1
  • 8
    • 0033364756 scopus 로고    scopus 로고
    • Authentication protocols with non-repudiation services in personal communication systems
    • Aug
    • H. Y. Lin and L. Harn, "Authentication protocols with non-repudiation services in personal communication systems," IEEE communication Letters, Volume 3, No. 8, Aug 1999, pp. 236-238.
    • (1999) IEEE communication Letters , vol.3 , Issue.8 , pp. 236-238
    • Lin, H.Y.1    Harn, L.2
  • 10
    • 47049118837 scopus 로고    scopus 로고
    • 3G TS 21.133: Security Threats and Requirements, http://www.etsi.org/
    • 3G TS 21.133: Security Threats and Requirements, http://www.etsi.org/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.