메뉴 건너뛰기




Volumn 6, Issue 11, 2010, Pages 5249-5258

A secure and efficient ecc-based AKA protocol for wireless mobile communications

Author keywords

Authentication; Elliptic curve cryptography; Key agreement; Key exchange; Wireless communications

Indexed keywords

AUTHENTICATED KEY AGREEMENT; BEST CHOICE; DIFFIE-HELLMAN KEY EXCHANGE PROTOCOL; ELLIPTIC CURVE CRYPTOGRAPHY; IMPROVED SCHEME; KEY AGREEMENT; KEY EXCHANGE; MUTUAL AUTHENTICATION; NEW DIRECTIONS; SESSION KEY; WIRELESS COMMUNICATIONS; WIRELESS ENVIRONMENT; WIRELESS MOBILE COMMUNICATIONS; WIRELESS MOBILE SYSTEMS;

EID: 78650369152     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (22)

References (23)
  • 3
    • 4043071218 scopus 로고    scopus 로고
    • Enhanced of key agreement protocols resistant to a denial-of-service attack
    • M.-S. Hwang, J.-W. Lo and C-H. Liu, Enhanced of key agreement protocols resistant to a denial-of-service attack, Fun damenta Informaticae, vol.61, no.4, ppi389-398, 2004.
    • (2004) Fun Damenta Informaticae , vol.61 , Issue.4 , pp. 389-398
    • Hwang, M.-S.1    Lo, J.-W.2    Liu, C.-H.3
  • 4
  • 7
    • 77956259869 scopus 로고    scopus 로고
    • Experimental study on secure communication of different scroll chaotic systems with identical structure
    • H. Chen, Q. Ding, L. Ding and X. Dong, Experimental study on secure communication of different scroll chaotic systems with identical structure, ICIC Eipress Letters, vol.2, no.2, pp.201-206, 2008.
    • (2008) ICIC Eipress Letters , vol.2 , Issue.2 , pp. 201-206
    • Chen, H.1    Ding, Q.2    Ding, L.3    Dong, X.4
  • 9
    • 0030261758 scopus 로고    scopus 로고
    • Strung passwurd-unly authenticated key exchange
    • D. P. Jablun, Strung passwurd-unly authenticated key exchange, ACM SIGCOMM Cv nip utri Cornmunication Review, vol.26, no.5, pp.5-26, 1996.
    • (1996) ACM SIGCOMM Cvnip Utri Cornmunication Review , vol.26 , Issue.5 , pp. 5-26
    • Jablun, D.P.1
  • 10
    • 73149093942 scopus 로고    scopus 로고
    • Efficient user authentication and key agreement with user privacy protection
    • W.-S. Juang and J.-L. Wu, Efficient user authentication and key agreement with user privacy protection, International Journal of Network Security, vol.?, no.1, pp.120-129, 2008.
    • (2008) International Journal of Network Security , vol.1 , Issue.1 , pp. 120-129
    • Juang, W.-S.1    Wu, J.-L.2
  • 11
    • 0011637140 scopus 로고    scopus 로고
    • An improvement of a simple authenticated key agreement algorithm
    • E. J.-L. Lu and M.-S. Hwang, An improvement of a simple authenticated key agreement algorithm, Pakistan Journal of Applied Sciences, vol.2, no.1, pp.64-65, 2002.
    • (2002) Pakistan Journal of Applied Sciences , vol.2 , Issue.1 , pp. 64-65
    • Lu, E.J.-L.1    Hwang, M.-S.2
  • 13
    • 0032658583 scopus 로고    scopus 로고
    • Simple authenticated key agreement algorithm
    • D. Seo and P. Sweeney, Simple authenticated key agreement algorithm, lEE Electronics Letters, vol.35, no.13, pp.1073-1074, 1999.
    • (1999) IEE Electronics Letters , vol.35 , Issue.13 , pp. 1073-1074
    • Seo, D.1    Sweeney, P.2
  • 14
    • 70350453453 scopus 로고    scopus 로고
    • Efficient certificateless authentication and key agreement (CL-AK) for grid computing
    • S. Wang, Z. Can and H. Ban, Efficient certificateless authentication and key agreement (CL-AK) for grid computing, International Journal of Network Security, vol.?, no.3, pp.342-347, 2008.
    • (2008) International Journal of Network Security , vol.1 , Issue.3 , pp. 342-347
    • Wang, S.1    Can, Z.2    Ban, H.3
  • 15
    • 77956248934 scopus 로고    scopus 로고
    • The home network system by mutual complement of wireless and wired communications
    • K. Yamada, K. Kimura, H. Yuki and K. Yosluda, The home network system by mutual complement of wireless and wired communications, ICIC Eipress Letters, vol.2, no.1, pp.73-79, 2008.
    • (2008) ICIC Eipress Letters , vol.2 , Issue.1 , pp. 73-79
    • Yamada, K.1    Kimura, K.2    Yuki, H.3    Yosluda, K.4
  • 16
    • 84874816729 scopus 로고    scopus 로고
    • Elliptic curve cryptography based wireless authentication protocol
    • Y. Liu, W. Gao, H. Yao and X. Yu, Elliptic curve cryptography based wireless authentication protocol, International Journal of Network Security, vol.5, no.3, pp.327-337, 2007.
    • (2007) International Journal of Network Security , vol.5 , Issue.3 , pp. 327-337
    • Liu, Y.1    Gao, W.2    Yao, H.3    Yu, X.4
  • 18
    • 34548132736 scopus 로고    scopus 로고
    • An enhanced authenticated key agreement protocol for wireless mobile communication
    • R. Lu, Z. Cao and H. Zhu, An enhanced authenticated key agreement protocol for wireless mobile communication, Comp uter Standards é Interfaces, vol.29, pp.647-652, 2007.
    • (2007) Computer Standards é Interfaces , vol.29 , pp. 647-652
    • Lu, R.1    Cao, Z.2    Zhu, H.3
  • 20
    • 0032069870 scopus 로고    scopus 로고
    • Key control in key agreement protocols
    • C. J. Mitchell, M. Ward and P. Wilson, Key control in key agreement protocols, Electronics Letters, vol.34, no.10, pp.980-981, 1998.
    • (1998) Electronics Letters , vol.34 , Issue.10 , pp. 980-981
    • Mitchell, C.J.1    Ward, M.2    Wilson, P.3
  • 21
    • 33750072402 scopus 로고    scopus 로고
    • Practical authenticated key agreement using passwords
    • T. Kwon, Practical authenticated key agreement using passwords, LNCS, vol.3225, pp.1-12, 2004.
    • (2004) LNCS , vol.3225 , pp. 1-12
    • Kwon, T.1
  • 22
    • 78650401240 scopus 로고    scopus 로고
    • SGPP2 N.S0011
    • SGPP2 N.S0011 vl.0, OTASP and OTAPA, http://www.3gpp2.org, 1999.
    • (1999) OTASP and OTAPA


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.