메뉴 건너뛰기




Volumn 31, Issue 4, 2009, Pages 629-641

A PK-SIM card based end-to-end security framework for SMS

Author keywords

End to end security; PK SIM card; Primary key; Public Key Infrastructure (PKI); Session key

Indexed keywords

END-TO-END SECURITY; PK-SIM CARD; PRIMARY KEY; PUBLIC KEY INFRASTRUCTURE (PKI); SESSION KEY;

EID: 64249114541     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2008.06.011     Document Type: Article
Times cited : (33)

References (29)
  • 2
    • 64249116492 scopus 로고    scopus 로고
    • The Monthly Statistics in Communication Industry
    • The Monthly Statistics in Communication Industry, http://www.mii.gov.cn/art/2006/12/22 /art_27_27537.htm.
  • 3
    • 24644522325 scopus 로고    scopus 로고
    • Secure mobile business applications framework, architecture and implementation
    • Walter T., et al. Secure mobile business applications framework, architecture and implementation. Information Security Technical Report 9, Issue 4 (December 2004) 6-21
    • (2004) Information Security Technical Report , vol.9 Issue 4 , pp. 6-21
    • Walter, T.1
  • 7
    • 0031234695 scopus 로고    scopus 로고
    • On certificate-based security protocols for wireless mobile communication systems
    • Park C.S. On certificate-based security protocols for wireless mobile communication systems. IEEE Network 11 5 (1997) 50-55
    • (1997) IEEE Network , vol.11 , Issue.5 , pp. 50-55
    • Park, C.S.1
  • 11
    • 9544227377 scopus 로고    scopus 로고
    • Improvement of Chien et al.'s remote user authentication scheme using smart cards
    • Lee S.-W., Kim H.-S., and Yoo K.-Y. Improvement of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces 27 (2005) 181-183
    • (2005) Computer Standards & Interfaces , vol.27 , pp. 181-183
    • Lee, S.-W.1    Kim, H.-S.2    Yoo, K.-Y.3
  • 12
    • 0742268499 scopus 로고    scopus 로고
    • Security of Chien et al.'s remote user authentication scheme using smart cards
    • Hsu C.-L. Security of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces 26 (2004) 167-169
    • (2004) Computer Standards & Interfaces , vol.26 , pp. 167-169
    • Hsu, C.-L.1
  • 13
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: smart card
    • Chien H.Y., Jan J.K., and Tseng Y.M. An efficient and practical solution to remote authentication: smart card. Computers and Security 21 4 (2002) 372-375
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 14
    • 27744498991 scopus 로고    scopus 로고
    • A new efficient authentication protocol for mobile networks
    • Hwang R.-J., and Su F.-F. A new efficient authentication protocol for mobile networks. Computer Standards & Interfaces 28 2 (December 2005) 241-252
    • (2005) Computer Standards & Interfaces , vol.28 , Issue.2 , pp. 241-252
    • Hwang, R.-J.1    Su, F.-F.2
  • 15
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart cards
    • Juang W.S. Efficient password authenticated key agreement using smart cards. Computers & Security 23 2 (2004) 167-173
    • (2004) Computers & Security , vol.23 , Issue.2 , pp. 167-173
    • Juang, W.S.1
  • 17
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote user authentication scheme using smart cards
    • Sun H.M. An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46 4 (2000) 958961
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.4 , pp. 958961
    • Sun, H.M.1
  • 18
    • 0037715403 scopus 로고    scopus 로고
    • A hybrid authentication protocol for large mobile network
    • Chien H.Y., and Jan J.K. A hybrid authentication protocol for large mobile network. The Journal of Systems and Software 67 (2003) 123130
    • (2003) The Journal of Systems and Software , vol.67 , pp. 123130
    • Chien, H.Y.1    Jan, J.K.2
  • 19
    • 84962060059 scopus 로고    scopus 로고
    • The logic of authentication protocols
    • Springer-Verlag
    • Syverson P., and Cervesato I. The logic of authentication protocols. LNCS 2171 (2001), Springer-Verlag 63-137
    • (2001) LNCS , vol.2171 , pp. 63-137
    • Syverson, P.1    Cervesato, I.2
  • 20
    • 0037376798 scopus 로고    scopus 로고
    • Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration
    • Grecas C.F., Maniatis S.I., and Venieris I.S. Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration. Mobile Networks and Applications 8 2 (2003) 145-150
    • (2003) Mobile Networks and Applications , vol.8 , Issue.2 , pp. 145-150
    • Grecas, C.F.1    Maniatis, S.I.2    Venieris, I.S.3
  • 21
    • 0347743847 scopus 로고    scopus 로고
    • The WAP forum's wireless public key infrastructure
    • Farrell S. The WAP forum's wireless public key infrastructure. Information Security Technical Report 5, Issue 3 (September 1 2000) 23-31
    • (2000) Information Security Technical Report , vol.5 Issue 3 , pp. 23-31
    • Farrell, S.1
  • 22
    • 34247501217 scopus 로고    scopus 로고
    • Advances in network smart cards authentication
    • Torres J., Izquierdo A., and Sierra J.M. Advances in network smart cards authentication. Computer Networks 51 9 (June 20 2007) 2249-2261
    • (2007) Computer Networks , vol.51 , Issue.9 , pp. 2249-2261
    • Torres, J.1    Izquierdo, A.2    Sierra, J.M.3
  • 27
    • 64249100887 scopus 로고    scopus 로고
    • Mobile Payment Forum, Risks and Threats Analysis and Security Best Practices for Mobile 2-Way Messaging Systems. [Online]. Available: http://www.mobilepaymentforum.org/documents/Risk_and_Threats_Analysis_and_Security_Best_%20Practices_%20Mobile_2_Way_Messaging_December_2002.pdf. Accessed on: 10 November 2007.
    • Mobile Payment Forum, Risks and Threats Analysis and Security Best Practices for Mobile 2-Way Messaging Systems. [Online]. Available: http://www.mobilepaymentforum.org/documents/Risk_and_Threats_Analysis_and_Security_Best_%20Practices_%20Mobile_2_Way_Messaging_December_2002.pdf. Accessed on: 10 November 2007.
  • 28
    • 33845570213 scopus 로고    scopus 로고
    • [Online]. Available: http://cryptome.org/a51-bsw.htm. Accessed on: 13 February 2007
    • Biryukov A., Shamir A., and Wagner D. Real Time Cryptanalysis of A5/1 on a PC (2000). http://cryptome.org/a51-bsw.htm [Online]. Available: http://cryptome.org/a51-bsw.htm. Accessed on: 13 February 2007
    • (2000) Real Time Cryptanalysis of A5/1 on a PC
    • Biryukov, A.1    Shamir, A.2    Wagner, D.3
  • 29
    • 53049088300 scopus 로고    scopus 로고
    • SMSSec: An end-to-end protocol for secure SMS
    • in press, doi:10.1016/j.cose.2008.05.003
    • J.L.C. Lo et al., SMSSec: An end-to-end protocol for secure SMS, Comput. Secur. (in press), doi:10.1016/j.cose.2008.05.003.
    • Comput. Secur
    • Lo, J.L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.