메뉴 건너뛰기




Volumn 9, Issue 11, 2010, Pages 3346-3353

An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks

Author keywords

anonymous; key agreement; mobile authentication; scalable; Self verified; wireless networks

Indexed keywords

ANONYMOUS; KEY AGREEMENT; MOBILE AUTHENTICATION; SCALABLE; SELF-VERIFIED;

EID: 78449298894     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2010.092410.090022     Document Type: Article
Times cited : (50)

References (23)
  • 1
    • 84893288752 scopus 로고    scopus 로고
    • Wireless local area network (WLAN) interworking security
    • 3GPP
    • 3GPP, "Wireless local area network (WLAN) interworking security," 3GPP TS 33.234, 2004.
    • (2004) 3GPP TS 33.234
  • 2
    • 35649015782 scopus 로고    scopus 로고
    • Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA)
    • J. Arkko and H. Haverinen, "Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA)," RFC 4187, 2006.
    • (2006) RFC , vol.4187
    • Arkko, J.1    Haverinen, H.2
  • 3
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway, "Random oracles are practical: a paradigm for designing efficient protocols," in Proc. 1st ACM Conf. Computer Commun. Security, 1993, pp. 62-73.
    • (1993) Proc. 1st ACM Conf. Computer Commun. Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 0027641891 scopus 로고
    • Privacy and authentication on a portable communications system
    • Aug.
    • M. J. Beller, L. F. Chang, and Y. Yacobi, "Privacy and authentication on a portable communications system," IEEE J. Sel. Areas Commun., vol. 11, no. 6, pp. 821-829, Aug. 1993.
    • (1993) IEEE J. Sel. Areas Commun. , vol.11 , Issue.6 , pp. 821-829
    • Beller, M.J.1    Chang, L.F.2    Yacobi, Y.3
  • 5
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469-472, 1985.
    • (1985) IEEE Trans. Inf. Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 8
    • 2542616812 scopus 로고    scopus 로고
    • Quest for personal control over mobile location privacy
    • Q. He, D. Wu, and P. Khosla, "Quest for personal control over mobile location privacy," IEEE Commun. Mag., vol. 42, no. 5, pp. 130-136, 2004.
    • (2004) IEEE Commun. Mag. , vol.42 , Issue.5 , pp. 130-136
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 9
    • 3042783229 scopus 로고    scopus 로고
    • A self-encryption mechanism for authentication of roaming and teleconference services
    • Mar.
    • K. F. Hwang and C. C. Chang, "A self-encryption mechanism for authentication of roaming and teleconference services," IEEE Trans. Wireless Commun., vol. 2, no. 2, pp. 400-407, Mar. 2003.
    • (2003) IEEE Trans. Wireless Commun. , vol.2 , Issue.2 , pp. 400-407
    • Hwang, K.F.1    Chang, C.C.2
  • 10
    • 50549098698 scopus 로고    scopus 로고
    • On parallelization of high-speed processors for elliptic curve cryptography
    • Sep.
    • K. Jarrinen and J. Skytta, "On parallelization of high-speed processors for elliptic curve cryptography," IEEE Trans. VLSI Syst., vol. 16, no. 9, pp. 1162-1175, Sep. 2008.
    • (2008) IEEE Trans. VLSI Syst. , vol.16 , Issue.9 , pp. 1162-1175
    • Jarrinen, K.1    Skytta, J.2
  • 11
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • Sep.
    • Y. Jiang, C. Lin, X. Shen, and M. Shi, "Mutual authentication and key exchange protocols for roaming services in wireless mobile networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2569-2576, Sep. 2006.
    • (2006) IEEE Trans. Wireless Commun. , vol.5 , Issue.9 , pp. 2569-2576
    • Jiang, Y.1    Lin, C.2    Shen, X.3    Shi, M.4
  • 12
    • 0142002511 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," Int. J. Inf. Security, vol. 1, no. 1, pp. 36-63, 2001.
    • (2001) Int. J. Inf. Security , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.3
  • 13
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the Internet protocol
    • Nov.
    • S. Kent and R. Atkinson, "Security architecture for the Internet protocol," RFC 2401, Nov. 1998.
    • (1998) RFC , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 14
    • 19944362854 scopus 로고    scopus 로고
    • A new delegation-based authentication protocol for use in portable communication systems
    • W. B. Lee and C. K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Trans. Wireless Commun., vol. 4, no. 1, pp. 57-64, 2005.
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , Issue.1 , pp. 57-64
    • Lee, W.B.1    Yeh, C.K.2
  • 15
    • 0032069870 scopus 로고    scopus 로고
    • On key control in key agreement protocols
    • C. Mitchell, M. Ward, and P. Wilson, "On key control in key agreement protocols," Electron. Lett., vol. 34, pp. 980-981, 1998.
    • (1998) Electron. Lett. , vol.34 , pp. 980-981
    • Mitchell, C.1    Ward, M.2    Wilson, P.3
  • 16
    • 0028397595 scopus 로고
    • Authentication of mobile users
    • R. Molva, D. Samfat, and G. Tsudik, "Authentication of mobile users," IEEE Network, vol. 8, no. 2, pp. 26-34, 1994.
    • (1994) IEEE Network , vol.8 , Issue.2 , pp. 26-34
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 17
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • B. C. Neuman and T. Tso, "Kerberos: an authentication service for computer networks," IEEE Commun. Mag., vol. 32, no. 9, pp. 33-38, 1994.
    • (1994) IEEE Commun. Mag. , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Tso, T.2
  • 18
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public-key cryptosystem
    • Feb.
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signature and public-key cryptosystem," Commun. ACM, vol. 21, pp. 120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 20
    • 58149108946 scopus 로고    scopus 로고
    • An efficient mobile authentication scheme for wireless networks
    • Apr.
    • C. Tang and D. O. Wu, "An efficient mobile authentication scheme for wireless networks," IEEE Trans. Wireless Commun., vol. 7, no. 4, pp. 1408-1416, Apr. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.4 , pp. 1408-1416
    • Tang, C.1    Wu, D.O.2
  • 21
    • 0035135698 scopus 로고    scopus 로고
    • Authentication of mobile users in the third generation mobile system
    • Jan.
    • Z. J. Tzeng and W. G. Tzeng, "Authentication of mobile users in the third generation mobile system," Wireless Personal Commun., vol. 16, no. 1, pp. 35-50, Jan. 2001.
    • (2001) Wireless Personal Commun. , vol.16 , Issue.1 , pp. 35-50
    • Tzeng, Z.J.1    Tzeng, W.G.2
  • 22
    • 35449005656 scopus 로고    scopus 로고
    • Anonymous and authenticated key exchange for roaming networks
    • G. Yang, D. S. Wong, and X. Deng, "Anonymous and authenticated key exchange for roaming networks," IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3461-3472, 2007.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.9 , pp. 3461-3472
    • Yang, G.1    Wong, D.S.2    Deng, X.3
  • 23
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Com-mun., vol. 4, no. 2, pp. 734-742, 2005.
    • (2005) IEEE Trans. Wireless Com-mun. , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.1    Fang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.