메뉴 건너뛰기




Volumn 46, Issue 1, 2011, Pages 31-41

An efficient authentication protocol for mobile communications

Author keywords

Authentication; GSM; Mobile communications; Security

Indexed keywords

AUTHENTICATION PROTOCOLS; BANDWIDTH CONSUMPTION; COMMUNICATION OVERHEADS; EFFICIENT AUTHENTICATION; GLOBAL SYSTEMS; GSM; MOBILE COMMUNICATIONS; MOBILE STATION; SECURITY; SECURITY ALGORITHM; STORAGE SPACES;

EID: 79951814345     PISSN: 10184864     EISSN: 15729451     Source Type: Journal    
DOI: 10.1007/s11235-009-9276-4     Document Type: Article
Times cited : (19)

References (37)
  • 4
    • 70350217693 scopus 로고    scopus 로고
    • Cryptanalysis of Parka's authentication protocol in wireless mobile communication systems
    • Dominguez, A. P. (2006). Cryptanalysis of Parka's authentication protocol in wireless mobile communication systems. International Journal of Network Security, 3(3), 279-282.
    • (2006) International Journal of Network Security , vol.3 , Issue.3 , pp. 279-282
    • Dominguez, A.P.1
  • 5
    • 79951810227 scopus 로고
    • ETSI Recommendation GSM 02.09: Security related network functions. Tech. rep., European Telecommunications Standards Institute, ETSI, June 1993
    • ETSI (1993). Recommendation GSM 02.09: Security related network functions. Tech. rep., European Telecommunications Standards Institute, ETSI, June 1993.
    • (1993)
  • 6
    • 79951809650 scopus 로고
    • ETSI Recommendation GSM 03.20: Security related network functions. Tech. rep., European Telecommunications Standards Institute, ETSI, June 1993
    • ETSI (1993). Recommendation GSM 03.20: Security related network functions. Tech. rep., European Telecommunications Standards Institute, ETSI, June 1993.
    • (1993)
  • 7
  • 11
    • 0033343111 scopus 로고    scopus 로고
    • Dynamic participation in a secure conference scheme for mobile communications
    • DOI 10.1109/25.790522
    • Hwang, M.-S. (1999). Dynamic participation in a secure conference scheme for mobile communications. IEEE Transactions on Vehicular Technology, 48(5), 1469-1474. (Pubitemid 30503764)
    • (1999) IEEE Transactions on Vehicular Technology , vol.48 , Issue.5 , pp. 1469-1474
    • Hwang, M.-S.1
  • 13
    • 23744437250 scopus 로고    scopus 로고
    • A secure protocol for bluetooth piconets using elliptic curve cryptography
    • DOI 10.1007/s11235-005-1689-0
    • Hwang, M.-S., Lee, C.-C., Lee, J.-Z., & Yang, C.-C. (2005). A secure protocol for bluetooth piconets using elliptic curve cryptography. Telecommunication Systems, 29(3), 165-180. (Pubitemid 41126277)
    • (2005) Telecommunication Systems , vol.29 , Issue.3 , pp. 165-180
    • Hwang, M.-S.1    Lee, C.-C.2    Lee, J.-Z.3    Yang, C.-C.4
  • 14
    • 84875347025 scopus 로고    scopus 로고
    • An efficient authentication protocol for GSM networks
    • Munich, Germany, May 2000
    • Hwang, M.-S., Tang, Y.-L., & Lee, C.-C. (2000). An efficient authentication protocol for GSM networks. In AFCEA/IEEE Euro- Comm'2000 (pp. 326-330), Munich, Germany, May 2000.
    • (2000) AFCEA/IEEE Euro- Comm'2000 , pp. 326-330
    • Hwang, M.-S.1    Tang, Y.-L.2    Lee, C.-C.3
  • 15
    • 0000875129 scopus 로고
    • Performance modeling of an auxiliary user location strategy in a PCS network
    • Jain, R., & Lin, Y. B. (1995). Performance modeling of an auxiliary user location strategy in a PCS network. ACM-Baltzer Wireless Networks, 1(2), 197-210.
    • (1995) ACM-Baltzer Wireless Networks , vol.1 , Issue.2 , pp. 197-210
    • Jain, R.1    Lin, Y.B.2
  • 19
    • 0032676481 scopus 로고    scopus 로고
    • Enhanced privacy and authentication for the global system for mobile communications
    • Lee, C. H., Hwang, M.-S., & Yang, W. P. (1999). Enhanced privacy and authentication for the global system for mobile communications. Wireless Networks, 5, 231-243.
    • (1999) Wireless Networks , vol.5 , pp. 231-243
    • Lee, C.H.1    Hwang, M.-S.2    Yang, W.P.3
  • 20
    • 46749113953 scopus 로고    scopus 로고
    • A new authentication protocol based on pointer forwarding for mobile communications
    • Lee, C.-C., Hwang, M.-S., & Liao, I.-E. (2008). A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communications and Mobile Computing, 8(5), 661-672.
    • (2008) Wireless Communications and Mobile Computing , vol.8 , Issue.5 , pp. 661-672
    • Lee, C.-C.1    Hwang, M.-S.2    Liao, I.-E.3
  • 22
    • 79951813707 scopus 로고    scopus 로고
    • An extended certificate-based authentication and security protocol for mobile networks
    • Lee, C.-C., Liao, I.-E., & Hwang, M.-S. (2009). An extended certificate-based authentication and security protocol for mobile networks. Information Technology and Control, 38(1), 61-66.
    • (2009) Information Technology and Control , vol.38 , Issue.1 , pp. 61-66
    • Lee, C.-C.1    Liao, I.-E.2    Hwang, M.-S.3
  • 25
    • 0033332268 scopus 로고    scopus 로고
    • Secure communication mechanisms for GSM networks
    • DOI 10.1109/30.809184
    • Lo, C.-C., & Chen, Y.-J. (1999). Secure communication mechanisms for GSM networks. IEEE Transactions on Consumer Electronics, 45(4), 1074-1080. (Pubitemid 30561606)
    • (1999) IEEE Transactions on Consumer Electronics , vol.45 , Issue.4 , pp. 1074-1080
    • Lo, C.-C.1    Chen, Y.-J.2
  • 27
    • 79951809334 scopus 로고    scopus 로고
    • Protection of an intrusion detection engine with watermarking in ad hoc networks
    • Mitrokotsa, A., Komninos, N., & Douligeris, C. (2010). Protection of an intrusion detection engine with watermarking in ad hoc networks. International Journal of Network Security, 10(2), 93-106.
    • (2010) International Journal of Network Security , vol.10 , Issue.2 , pp. 93-106
    • Mitrokotsa, A.1    Komninos, N.2    Douligeris, C.3
  • 28
    • 0028397595 scopus 로고
    • Authentication of mobile users
    • Molva, R., Samfat, D., & Tsudik, G. (1994). Authentication of mobile users. IEEE Network, 8(2), 26-34.
    • (1994) IEEE Network , vol.8 , Issue.2 , pp. 26-34
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 29
    • 84874825833 scopus 로고    scopus 로고
    • A game theoretic formulation for intrusion detection in mobile ad hoc networks
    • Patcha, A., & Park, J.-M. (2006). A game theoretic formulation for intrusion detection in mobile ad hoc networks. International Journal of Network Security, 2(2), 131-137.
    • (2006) International Journal of Network Security , vol.2 , Issue.2 , pp. 131-137
    • Patcha, A.1    Park, J.-M.2
  • 30
    • 84944291851 scopus 로고
    • Overview of the GSM system and protocol architecture
    • Rahnema, M. (1993). Overview of the GSM system and protocol architecture. IEEE Communication Magazine, 31, 92-100.
    • (1993) IEEE Communication Magazine , vol.31 , pp. 92-100
    • Rahnema, M.1
  • 31
    • 44549083472 scopus 로고    scopus 로고
    • Pulsing RoQ DDoS attacking and defense scheme in mobile ad hoc networks
    • Ren,W. (2007). Pulsing RoQ DDoS attacking and defense scheme in mobile ad hoc networks. International Journal of Network Security, 4(2), 227-234.
    • (2007) International Journal of Network Security , vol.4 , Issue.2 , pp. 227-234
    • Ren, W.1
  • 32
    • 0028397595 scopus 로고
    • Authentication of mobile users
    • Samfat, D., Molva, R., & Tsudik, G. (1994). Authentication of mobile users. IEEE Network, 8, 26-34.
    • (1994) IEEE Network , vol.8 , pp. 26-34
    • Samfat, D.1    Molva, R.2    Tsudik, G.3
  • 33
    • 0032685793 scopus 로고    scopus 로고
    • Performance of an enhanced GSM protocol supporting non-repudiation of service
    • Stach, J. F., Park, E. K., & Makki, K. (1999). Performance of an enhanced GSM protocol supporting non-repudiation of service. Computer Communications, 22, 675-680.
    • (1999) Computer Communications , vol.22 , pp. 675-680
    • Stach, J.F.1    Park, E.K.2    Makki, K.3
  • 35
    • 63149108602 scopus 로고    scopus 로고
    • Security measures and weaknesses of the GPRS security architecture
    • Xenakis, C. (2008). Security measures and weaknesses of the GPRS security architecture. International Journal of Network Security, 6(2), 158-169.
    • (2008) International Journal of Network Security , vol.6 , Issue.2 , pp. 158-169
    • Xenakis, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.