메뉴 건너뛰기




Volumn 12, Issue 2, 2013, Pages 65-74

Scalable and efficient mobile authentication scheme preserving user privacy

Author keywords

Anonymity; Authentication; Roaming service; Unlinkability; User mobility

Indexed keywords

COMPUTER NETWORKS;

EID: 84878299380     PISSN: 17438225     EISSN: 17438233     Source Type: Journal    
DOI: 10.1504/IJAHUC.2013.052345     Document Type: Article
Times cited : (1)

References (30)
  • 1
    • 84878266952 scopus 로고    scopus 로고
    • GPP, Technical Specification Group (TSG) SA
    • GPP (2003) 3G Security, Security Architecture, Technical Specification Group (TSG) SA.
    • (2003) 3G Security, Security Architecture
  • 3
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Bellare, M. and Rogaway, P. (1993) 'Random oracles are practical: A paradigm for designing efficient protocols', Proc. 1st ACM Conf. Computer Commun. Security, pp.62-73.
    • (1993) Proc. 1st ACM Conf. Computer Commun. Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 0027641891 scopus 로고
    • Privacy and authentication on a portable communications system
    • Beller, M.J., Chang, L.F. and Yacobi, Y. (1993) 'Privacy and authentication on a portable communications system', IEEE J. Sel. Areas Commun., Vol. 11, No. 6, pp.821-829.
    • (1993) IEEE J. Sel. Areas Commun. , vol.11 , pp. 6821-6829
    • Beller, M.J.1    Chang, L.F.2    Yacobi, Y.3
  • 7
    • 78449298894 scopus 로고    scopus 로고
    • An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks
    • Chang, C-C. and Tsai, H-C. (2010) 'An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks', IEEE Trans. Wireless Commun., Vol. 9, No. 11, pp.3346-3353.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.11 , pp. 3346-3353
    • Chang, C.-C.1    Tsai, H.-C.2
  • 8
    • 36348930056 scopus 로고    scopus 로고
    • Netsted onetime secret mechanisms for fast mutual authentication in mobile communications
    • Kowloon Hong Kong
    • Chun I, Ho, P-H. and Chen, H.-Y. (2007) 'Netsted onetime secret mechanisms for fast mutual authentication in mobile communications', IEEE Wireless Communications and Networking Conference, pp. 2714-2719, Kowloon, Hong Kong.
    • (2007) IEEE Wireless Communications and Networking Conference , pp. 2714-2719
    • Chun, I.1    Ho, P.-H.2    Chen, H.-Y.3
  • 9
    • 84878283193 scopus 로고
    • GSM recommendations' GSM release 92 0102-2714-2719 kowloon Hong Kong ETSI (1993
    • ETSI, Release 92 1221
    • ETSI (1993) 'GSM recommendations', GSM Release 92. 01.02-12.21.
    • (1993) GSM recommendations' GSM
  • 11
    • 2542616812 scopus 로고    scopus 로고
    • Quest for personal control over mobile location privacy
    • He, Q., Wu, D. and Khosla, P. (2004) 'Quest for personal control over mobile location privacy', IEEE Commun. Mag., Vol. 42, No. 5, pp.130-136.
    • (2004) IEEE Commun. Mag. , vol.42 , pp. 5130-5136
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 12
    • 33744500005 scopus 로고    scopus 로고
    • Authentication and key agreement protocol for UMTS with low bandwidth consumption
    • 1423523, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
    • Huang, C-M. and Li, J-W. (2005) 'Authentication and key agreement protocol for umts with low bandwidth consumption', Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA), pp. 392-397, Taipei, Taiwan. (Pubitemid 43803865)
    • (2005) Proceedings - International Conference on Advanced Information Networking and Applications, AINA , vol.1 , pp. 392-397
    • Huang, C.-M.1    Li, J.-W.2
  • 13
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • Jiang, Y., Lin, C., Shen, X. and Shi, M. (2006) 'Mutual authentication and key exchange protocols for roaming services in wireless mobile networks', IEEE Trans. Wireless Commun., Vol. 5, No. 9, pp.2569-2576.
    • (2006) IEEE Trans. Wireless Commun. , vol.5 , pp. 92569-92576
    • Jiang, Y.1    Lin, C.2    Shen, X.3    Shi, M.4
  • 14
    • 0142002511 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • Johnson, D., Menezes, A. and Vanstone, S. (2001) 'The elliptic curve digital signature algorithm (ECDSA)', Int. J. Inf. Security, Vol. 1, No. 1, pp.36-63.
    • (2001) Int. J. Inf. Security , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.3
  • 16
    • 19944362854 scopus 로고    scopus 로고
    • A new delegationbased authentication protocol for use in portable communication systems
    • Lee, W.B. and Yeh, C.K. (2005) 'A new delegationbased authentication protocol for use in portable communication systems', IEEE Trans. Wireless Commun., Vol. 4, No. 1, pp.57-64.
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , pp. 157-164
    • Lee, W.B.1    Yeh, C.K.2
  • 17
    • 79960838031 scopus 로고    scopus 로고
    • Provably secure and efficient authentication techniques for the global mobility network
    • Lee, T-F. and Hwang, T. (2011) 'Provably secure and efficient authentication techniques for the global mobility network', The Journal of Systems and Software, Vol. 84, pp. 1717-1725.
    • (2011) The Journal of Systems and Software , vol.84 , pp. 1717-1725
    • Lee, T.-F.1    Hwang, T.2
  • 18
    • 82755189733 scopus 로고    scopus 로고
    • A novel user authentication and privacy preserving scheme with smart cards for wireless communications
    • doi:10.1016/j.mcm.2011.01.010
    • Li, C-T. and Lee, C-C. (2011) 'A novel user authentication and privacy preserving scheme with smart cards for wireless communications', Mathematical and Computer Modelling, doi:10.1016/j.mcm.2011.01.010.
    • (2011) Mathematical and Computer Modelling
    • Li, C.-T.1    Lee, C.-C.2
  • 21
    • 67650870141 scopus 로고    scopus 로고
    • TK-AKA: Using temporary key on Authentication and Key Agreement protocol on UMTS
    • Ou, H-H., Lin, I-C., Hwang, M-S. and Jan, J-k. (2009) 'TK-AKA: Using temporary key on Authentication and Key Agreement protocol on UMTS', Int. Journal of Network Management, Vol. 19, No. 4, pp.291-303.
    • (2009) Int. Journal of Network Management , vol.19 , Issue.4 , pp. 291-303
    • Ou, H.-H.1    Lin, I.-C.2    Hwang, M.-S.3    Jan, J.-K.4
  • 22
    • 73149084427 scopus 로고    scopus 로고
    • A cocktail protocol with the Authentication and Key Agreement on the UMTS
    • Ou, H-H., Hwang, M-S. and Jan, J-k. (2010) 'A cocktail protocol with the Authentication and Key Agreement on the UMTS', Journal of Systems and Software, Vol. 83, No. 2, pp.316-325.
    • (2010) Journal of Systems and Software , vol.83 , Issue.2 , pp. 316-325
    • Ou, H.-H.1    Hwang, M.-S.2    Jan, J.-K.3
  • 24
    • 84934300668 scopus 로고    scopus 로고
    • Computing cryptographic algorithms in portable and embedded devices
    • Orlando
    • Ramachandran, A., Zhou, Z. and Huang, D. (2001) 'Computing cryptographic algorithms in portable and embedded devices', Proc. of IEEE PORTABLE 2007, pp. 1-7, Orlando.
    • (2001) Proc. of IEEE PORTABLE 2007 , pp. 1-7
    • Ramachandran, A.1    Zhou, Z.2    Huang, D.3
  • 26
    • 58149108946 scopus 로고    scopus 로고
    • An efficient mobile authentication scheme for wireless networks
    • Tang, C. and Wu, D.O. (2008) 'An efficient mobile authentication scheme for wireless networks', IEEE Trans. Wireless Commun., Vol. 7, No. 4, pp.1408-1416.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , pp. 41408-41416
    • Tang, C.1    Wu, D.O.2
  • 27
    • 77950642661 scopus 로고    scopus 로고
    • Security analysis of a cocktail protocol with the authentication and key agreement on the umts
    • Wu, S., Zhu, Y. and Pu, Q. (2010) 'Security analysis of a cocktail protocol with the authentication and key agreement on the umts', Comm. Letters., Vol. 14, pp. 366-368
    • (2010) Comm. Letters. , vol.14 , pp. 366-368
    • Wu, S.1    Zhu, Y.2    Pu, Q.3
  • 28
    • 35449005656 scopus 로고    scopus 로고
    • Anonymous and authenticated key exchange for roaming networks
    • Yang, G., Wong, D.S. and Deng, X. (2007) 'Anonymous and authenticated key exchange for roaming networks', IEEE Trans. Wireless Commun., Vol. 6, No. 9, pp.3461-3472.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , pp. 93461-93472
    • Yang, G.1    Wong, D.S.2    Deng, X.3
  • 29
    • 78651364381 scopus 로고    scopus 로고
    • Provable secure authentication protocol with anonymity for roaming service in global mobility networks
    • Zhou, T. and Xu, J. (2011) 'Provable secure authentication protocol with anonymity for roaming service in global mobility networks', Computer Networks, Vol. 55, No. 1, pp.205-213.
    • (2011) Computer Networks , vol.55 , Issue.1 , pp. 205-213
    • Zhou, T.1    Xu, J.2
  • 30
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • Zhang, M. and Fang, Y. (2005) 'Security analysis and enhancements of 3GPP authentication and key agreement protocol', IEEE Trans. Wireless Commun., Vol. 4, No. 2, pp.734-742.
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , pp. 2734-2742
    • Zhang, M.1    Fang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.