메뉴 건너뛰기




Volumn 30, Issue 1, 2012, Pages 29-38

A simple and efficient authentication scheme for mobile satellite communication systems

Author keywords

authentication; extended Euclidean algorithm; mobile satellite communication system; security; self verification

Indexed keywords

COMPLEX COMPUTATION; COMPUTATION COSTS; EFFICIENT AUTHENTICATION; EXCLUSIVE-OR; EXTENDED EUCLIDEAN ALGORITHM; IMPERSONATION ATTACK; MOBILE SATELLITE COMMUNICATION SYSTEMS; MOBILE USERS; MUTUAL AUTHENTICATION; PERFECT FORWARD SECRECY; PUBLIC KEY CRYPTOSYSTEMS; REPLAY ATTACK; SECRET KEY; SECURITY; SECURITY REQUIREMENTS; SELF-VERIFICATION; SERVER ATTACKS; SESSION KEY; STOLEN VERIFIER ATTACK; USER ANONYMITY;

EID: 84255177653     PISSN: 15420973     EISSN: 15420981     Source Type: Journal    
DOI: 10.1002/sat.993     Document Type: Article
Times cited : (64)

References (25)
  • 2
    • 33845229781 scopus 로고    scopus 로고
    • An efficient authentication protocol for mobile satellite communication systems
    • Chang YF, Chang CC,. An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Operating Systems Review 2005; 39 (1): 70-84.
    • (2005) ACM SIGOPS Operating Systems Review , vol.39 , Issue.1 , pp. 70-84
    • Chang, Y.F.1    Chang, C.C.2
  • 3
    • 57849121084 scopus 로고    scopus 로고
    • A self-verification authentication mechanism for mobile satellite communication systems
    • Chen TH, Lee WB, Chen HB,. A self-verification authentication mechanism for mobile satellite communication systems. Comput Electr Eng 2009; 35 (1): 41-48.
    • (2009) Comput Electr Eng , vol.35 , Issue.1 , pp. 41-48
    • Chen, T.H.1    Lee, W.B.2    Chen, H.B.3
  • 4
    • 0031075864 scopus 로고    scopus 로고
    • Trends in mobile satellite technology
    • Comparetto G, Ramirez R,. Trends in mobile satellite technology. IEEE Computer 1999; 30 (2): 44-52. (Pubitemid 127556437)
    • (1997) Computer , vol.30 , Issue.2 , pp. 44-52
    • Comparetto, G.1    Ramirez, R.2
  • 5
    • 84948962858 scopus 로고
    • Blind signatures based on discrete logarithm problem
    • In, Lecture Notes in Computer Science, Italy.
    • Camenisch J, Piveteau J, Stadler M,. Blind signatures based on discrete logarithm problem. In Advances in Cryptology, EUROCRYPT'94, Lecture Notes in Computer Science, Italy, 950, 1994; 428-432.
    • (1994) Advances in Cryptology, EUROCRYPT'94 , vol.950 , pp. 428-432
    • Camenisch, J.1    Piveteau, J.2    Stadler, M.3
  • 6
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Diffie W, Hellman M,. New directions in cryptography. IEEE Trans Inf Theory 1976; 22 (6): 644-654.
    • (1976) IEEE Trans Inf Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 7
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public key infrastructure
    • Ellison C, Schneier B,. Ten risks of PKI: what you're not being told about public-key infrastructure. Computer Security Journal 2000; 16 (1): 1-7. (Pubitemid 30565287)
    • (2000) Computer Security Journal , vol.16 , Issue.1 , pp. 1-7
    • Ellison Carl1    Schneier Bruce2
  • 8
    • 1642389423 scopus 로고    scopus 로고
    • Next generation satellite systems for aeronautical communications
    • Ercetin O, Ball MO, Tassiulas L,. Next generation satellite systems for aeronautical communications. Int J Satell Commun Netw 2004; 22 (2): 157-179.
    • (2004) Int J Satell Commun Netw , vol.22 , Issue.2 , pp. 157-179
    • Ercetin, O.1    Ball, M.O.2    Tassiulas, L.3
  • 10
    • 23344445845 scopus 로고    scopus 로고
    • An authentication scheme for mobile satellite communication systems
    • Hwang MS, Yang CC, Shiu CY,. An authentication scheme for mobile satellite communication systems. ACM SIGOPS Operating Systems Review 2003; 37 (4): 42-47.
    • (2003) ACM SIGOPS Operating Systems Review , vol.37 , Issue.4 , pp. 42-47
    • Hwang, M.S.1    Yang, C.C.2    Shiu, C.Y.3
  • 11
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L,. Password authentication with insecure communication. Communication of ACM 1981; 24: 770-772.
    • (1981) Communication of ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 13
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • DOI 10.1109/TMC.2006.16
    • Potlapally NR, Ravi S, Raghunathan A, Jha NK,. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans Mob Comput 2006; 5 (2): 128-143. (Pubitemid 43671073)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 16
    • 34249790293 scopus 로고    scopus 로고
    • Cryptanalysis of robust E-mail Protocols with perfect forward secrecy
    • DOI 10.1109/LCOMM.2007.061770
    • Yoon EJ, Yoo KY,. Cryptanalysis of robust e-mail protocols with perfect forward secrecy. IEEE Communication Letters 2007; 11 (5): 372-374. (Pubitemid 46851580)
    • (2007) IEEE Communications Letters , vol.11 , Issue.5 , pp. 372-374
    • Yoon, E.J.1    Yoo, K.Y.2
  • 17
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu J, Ma J,. A new authentication scheme with anonymity for wireless environments. IEEE Transaction on Consumer Electronic 2004; 50 (1): 230-234.
    • (2004) IEEE Transaction on Consumer Electronic , vol.50 , Issue.1 , pp. 230-234
    • Zhu, J.1    Ma, J.2
  • 18
    • 15744365243 scopus 로고    scopus 로고
    • Improvements on the WTLS protocol to avoid denial of service attacks
    • DOI 10.1016/j.cose.2004.10.002, PII S0167404804002597
    • Zhang R, Chen K,. Improvements on the WTLS protocol to avoid denial of service attacks. Computers & Security 2005; 24 (5): 76-82. (Pubitemid 40415403)
    • (2005) Computers and Security , vol.24 , Issue.1 , pp. 76-82
    • Zhang, R.1    Chen, K.2
  • 20
    • 84863012591 scopus 로고    scopus 로고
    • A new type of ID-based encryption system and its application to pay-TV systems
    • Zhao X, Zhang F,. A new type of ID-based encryption system and its application to pay-TV systems. International Journal of Network Security 2011; 13 (3): 161-166.
    • (2011) International Journal of Network Security , vol.13 , Issue.3 , pp. 161-166
    • Zhao, X.1    Zhang, F.2
  • 22
    • 65449142931 scopus 로고    scopus 로고
    • Evaluation of call blocking probabilities in LEO satellite networks
    • Yiltas D, Halim Zaim A,. Evaluation of call blocking probabilities in LEO satellite networks. Int J Satell Commun Netw 2009; 27 (2): 103-115.
    • (2009) Int J Satell Commun Netw , vol.27 , Issue.2 , pp. 103-115
    • Yiltas, D.1    Halim Zaim, A.2
  • 23
    • 35948951957 scopus 로고    scopus 로고
    • A novel QoS routing protocol for LEO and MEO satellite networks
    • Zhou Y, Sun F, Zhang B,. A novel QoS routing protocol for LEO and MEO satellite networks. Int J Satell Commun Netw 2007; 25 (6): 603-617.
    • (2007) Int J Satell Commun Netw , vol.25 , Issue.6 , pp. 603-617
    • Zhou, Y.1    Sun, F.2    Zhang, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.