메뉴 건너뛰기




Volumn 8, Issue 5, 2009, Pages 2166-2171

Enhanced delegation-based authentication protocol for PCSs

Author keywords

Mobile communication systems; Network security; Portable communication systems

Indexed keywords

AUTHENTICATION PROTOCOLS; COMPUTATIONAL COSTS; LOCATION REGISTER; MOBILE COMMUNICATION SYSTEMS; MOBILE USERS; NON-REPUDIATION; PORTABLE COMMUNICATION SYSTEMS; SECURITY PROPERTIES;

EID: 67649408914     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2009.070032     Document Type: Article
Times cited : (31)

References (11)
  • 1
    • 0032678890 scopus 로고    scopus 로고
    • Security and authentication in PCS
    • H.-Y. Lin, "Security and authentication in PCS," Comput. Elect. Eng., vol. 25, no. 4, pp. 225-248, 1999.
    • (1999) Comput. Elect. Eng , vol.25 , Issue.4 , pp. 225-248
    • Lin, H.-Y.1
  • 2
    • 0032124041 scopus 로고    scopus 로고
    • Mobility and security management in the GSM system and some proposed future improvements
    • July
    • A. Merotra and L. Golding, "Mobility and security management in the GSM system and some proposed future improvements," Proc. IEEE, vol. 86, pp. 1480-1496, July 1998.
    • (1998) Proc. IEEE , vol.86 , pp. 1480-1496
    • Merotra, A.1    Golding, L.2
  • 3
    • 7244236291 scopus 로고    scopus 로고
    • Localised authentication for internetwork roaming across wireless LANs
    • Oct
    • M. Long, C.-H. Wu, and J. D. Irwin, "Localised authentication for internetwork roaming across wireless LANs," IEE Proc. Commun., vol. 151, no. 5, pp. 496-500, Oct. 2004.
    • (2004) IEE Proc. Commun , vol.151 , Issue.5 , pp. 496-500
    • Long, M.1    Wu, C.-H.2    Irwin, J.D.3
  • 4
    • 28544452660 scopus 로고    scopus 로고
    • Private authentication techniques for the global mobility network
    • Dec
    • T.-F. Lee, C.-C. Chang, and T. Hwang, "Private authentication techniques for the global mobility network," Wireless Personal Commun., vol. 35, no. 4, pp. 329-336, Dec. 2005
    • (2005) Wireless Personal Commun , vol.35 , Issue.4 , pp. 329-336
    • Lee, T.-F.1    Chang, C.-C.2    Hwang, T.3
  • 5
    • 19944362854 scopus 로고    scopus 로고
    • A new delegation-based authentication protocol for use in portable communication systems
    • Jan
    • W.-B. Lee and C.-K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Trans. Wireless Commun., vol. 4, no. 1, pp. 57-64, Jan. 2005
    • (2005) IEEE Trans. Wireless Commun , vol.4 , Issue.1 , pp. 57-64
    • Lee, W.-B.1    Yeh, C.-K.2
  • 6
    • 84944291851 scopus 로고
    • Overview of the GSM system and protocol architecture
    • Apr
    • M. Rahnema, "Overview of the GSM system and protocol architecture," IEEE Commun. Mag., pp. 92-100, Apr. 1993.
    • (1993) IEEE Commun. Mag , pp. 92-100
    • Rahnema, M.1
  • 8
    • 0033364756 scopus 로고    scopus 로고
    • Authentication protocols with non-repudiation services in personnel communication systems
    • Aug
    • H.-Y. Lin and L. Harn, "Authentication protocols with non-repudiation services in personnel communication systems," IEEE Commun. Lett., vol. 3, no. 8, pp. 236-238, Aug. 1999.
    • (1999) IEEE Commun. Lett , vol.3 , Issue.8 , pp. 236-238
    • Lin, H.-Y.1    Harn, L.2
  • 9
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password authentication with insecure communication," Commun. of ACM, vol. 24, no. 11, pp. 770-772, 1981.
    • (1981) Commun. of ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 10
    • 0005314429 scopus 로고    scopus 로고
    • The state of cryptographic hash functions
    • Lectures on Data Security: Modern Cryptology in Theory and Practice, Berlin: Springer, pp
    • B. Preneel, "The state of cryptographic hash functions," in Lectures on Data Security: Modern Cryptology in Theory and Practice, LNCS 1561. Berlin: Springer, pp. 158-192, 1999
    • (1999) LNCS , vol.1561 , pp. 158-192
    • Preneel, B.1
  • 11
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • Mar
    • M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Com-mun., vol. 4, pp. 734-742, Mar. 2005.
    • (2005) IEEE Trans. Wireless Com-mun , vol.4 , pp. 734-742
    • Zhang, M.1    Fang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.