메뉴 건너뛰기




Volumn 34, Issue 3, 2012, Pages 314-326

Preventing delegation-based mobile authentications from man-in-the-middle attacks

Author keywords

Elliptic curve cryptosystem; Mobile communication; Mutual authentication; Security

Indexed keywords

AUTHENTICATION PROTOCOLS; COMMUNICATION EFFICIENCY; COMPUTATION EFFICIENCY; DENIAL OF SERVICE ATTACKS; ELLIPTIC CURVE CRYPTOSYSTEM; KEY CHAIN; MAN IN THE MIDDLE ATTACKS; MESSAGE AUTHENTICATION CODES; MOBILE ACCESS; MOBILE AUTHENTICATION; MOBILE COMMUNICATIONS; MOBILE USERS; MUTUAL AUTHENTICATION; SECURITY; SESSION KEY;

EID: 84857036692     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2011.10.014     Document Type: Article
Times cited : (9)

References (23)
  • 1
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham, and M.D. Schroeder Using encryption for authentication in large networks of computers Communication of ACM 21 12 1978 993 999
    • (1978) Communication of ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 4
    • 0033907037 scopus 로고    scopus 로고
    • Extensions to an authentication technique proposed for the global mobility network
    • DOI 10.1109/26.837039
    • L. Buttyan, C. Gbaguidi, S. Staamann, and U. Wilhelm Extensions to an authentication technique proposed for the global mobility network IEEE Transactions on Communications 48 3 2000 373 376 (Pubitemid 30589215)
    • (2000) IEEE Transactions on Communications , vol.48 , Issue.3 , pp. 373-376
    • Buttyan, L.1    Gbaguidi, C.2    Staamann, S.3    Wilhelm, U.4
  • 5
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • Y. Jiang, C. Lin, X. Shen, and M. Shi Mutual authentication and key exchange protocols for roaming services in wireless mobile networks IEEE Transactions on Wireless Communications 5 9 2006 2569 2577
    • (2006) IEEE Transactions on Wireless Communications , vol.5 , Issue.9 , pp. 2569-2577
    • Jiang, Y.1    Lin, C.2    Shen, X.3    Shi, M.4
  • 6
    • 19944362854 scopus 로고    scopus 로고
    • A new delegation-based authentication protocol for use in portable communication systems
    • DOI 10.1109/TWC.2004.840220
    • W.-B. Lee, and C.-K. Yeh A new delegation-based authentication protocol for use in portable communication systems IEEE Transactions on Wireless Communications 4 1 2005 57 64 (Pubitemid 40748808)
    • (2005) IEEE Transactions on Wireless Communications , vol.4 , Issue.1 , pp. 57-64
    • Lee, W.-B.1    Yeh, C.-K.2
  • 7
    • 58149108946 scopus 로고    scopus 로고
    • An efficient mobile authentication for wireless networks
    • C. Tang, and D.O. Wu An efficient mobile authentication for wireless networks IEEE Transactions on Wireless Communications 7 4 2008 1408 1416
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.4 , pp. 1408-1416
    • Tang, C.1    Wu, D.O.2
  • 8
    • 41149155794 scopus 로고    scopus 로고
    • Mobile privacy in wireless networks-revisited
    • DOI 10.1109/TWC.2008.060802, 4471983
    • C. Tang, and D.O. Wu Mobile privacy in wireless networks revisited IEEE Transactions on Wireless Communications 7 3 2008 1035 1042 (Pubitemid 351436491)
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.3 , pp. 1035-1042
    • Tang, C.1    Wu, D.O.2
  • 9
    • 3042783229 scopus 로고    scopus 로고
    • A self-encryption mechanism for authentication of roaming and teleconference services
    • K.F. Hwang, and C.C. Chang A self-encryption mechanism for authentication of roaming and teleconference services IEEE Transactions on Wireless Communications 2 2 2003 400 407
    • (2003) IEEE Transactions on Wireless Communications , vol.2 , Issue.2 , pp. 400-407
    • Hwang, K.F.1    Chang, C.C.2
  • 10
    • 77953684927 scopus 로고    scopus 로고
    • Provably secure nested one-time secret mechanisms for fast mutual authentication and key exchange in mobile communications
    • C.-I. Fan, P.-H. Ho, and R.-H. Hsu Provably secure nested one-time secret mechanisms for fast mutual authentication and key exchange in mobile communications EEE/ACM Transactions on Networking 18 3 2010 996 1094
    • (2010) EEE/ACM Transactions on Networking , vol.18 , Issue.3 , pp. 996-1094
    • Fan, C.-I.1    Ho, P.-H.2    Hsu, R.-H.3
  • 12
    • 77957706439 scopus 로고    scopus 로고
    • Improved delegation-based authentication protocol for secure roaming service with unlinkability
    • T.-Y. Youn, and J. Lim Improved delegation-based authentication protocol for secure roaming service with unlinkability IEEE Communications Letters 14 9 2010 791 793
    • (2010) IEEE Communications Letters , vol.14 , Issue.9 , pp. 791-793
    • Youn, T.-Y.1    Lim, J.2
  • 14
    • 0343337504 scopus 로고    scopus 로고
    • Nonmalleable cryptography
    • DOI 10.1137/S0097539795291562, PII S0097539795291562
    • D. Dolev, C. Dwork, and M. Naor Nonmalleable cryptography SIAM Journal of Computing 30 2 2000 391 437 (Pubitemid 32469583)
    • (2001) SIAM Journal on Computing , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 17
    • 38349174973 scopus 로고    scopus 로고
    • Designing efficient proxy signature schemes for mobile communication
    • R. Lu, D. Dong, and Z. Cao Designing efficient proxy signature schemes for mobile communication Science in China Series F: Information Science 51 2 2008 183 195
    • (2008) Science in China Series F: Information Science , vol.51 , Issue.2 , pp. 183-195
    • Lu, R.1    Dong, D.2    Cao, Z.3
  • 18
    • 84857051270 scopus 로고    scopus 로고
    • FIPS Pub. 197: Advanced Encryption Standard (AES)
    • FIPS Pub. 197: Advanced Encryption Standard (AES) N. I. of Science and Technology 2001
    • (2001) N. I. of Science and Technology
  • 20
    • 0038670954 scopus 로고    scopus 로고
    • Software Implementation of Elliptic Curve Cryptography over Binary Fields
    • Cryptographic Hardware and Embedded Systems - CHES 2000 Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings
    • D. Hankerson, J.L. Hernandez, and A. Menezes Software implementation of elliptic curve cryptography over binary fields Proceedings CHES 2000 (LNCS 1965) 2000 Springer-Verlag 1 24 (Pubitemid 33213954)
    • (2000) Lecture Notes in Computer Science , Issue.1965 , pp. 1-24
    • Hankerson, D.1    Hernandez, J.L.2    Menezes, A.3
  • 21
    • 84949230533 scopus 로고    scopus 로고
    • Key Agreement Protocols and Their Security Analysis
    • Cryptography and Coding
    • S. Blake-Wilson, D. Johnson, and A. Menezes Key agreement protocols and their security analysis Proc. 6th IMA Int. Conf. Cryptography Coding 1997 30 45 (Pubitemid 128005797)
    • (1997) Lecture Notes in Computer Science , Issue.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 23
    • 65849441512 scopus 로고    scopus 로고
    • Security model and framework for information aggregation in sensor networks
    • Article 13
    • M. Manulis, and J. Schwenk Security model and framework for information aggregation in sensor networks ACM Transactions on Sensor Networks 5(2) 2009 Article 13
    • (2009) ACM Transactions on Sensor Networks , vol.52
    • Manulis, M.1    Schwenk, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.