메뉴 건너뛰기




Volumn 77, Issue 1, 2014, Pages 197-224

Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets

Author keywords

Authentication; GSM; Key exchange; One time secret; Transaction sequence number; UMTS

Indexed keywords

CRYPTOGRAPHY; GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS; MOBILE TELECOMMUNICATION SYSTEMS; QUALITY OF SERVICE;

EID: 84903610110     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11277-013-1501-5     Document Type: Article
Times cited : (24)

References (26)
  • 3
    • 47649105900 scopus 로고    scopus 로고
    • Mutual authentication and key agreement based on elliptic curve cryptography for GSM
    • Ammayappan, K.; Saxena, A.; Negi, A. (2006). Mutual authentication and key agreement based on elliptic curve cryptography for GSM. ADCOM, 2006, 183-187.
    • (2006) ADCOM , vol.2006 , pp. 183-187
    • Ammayappan, K.1    Saxena, A.2    Negi, A.3
  • 10
    • 11244303182 scopus 로고    scopus 로고
    • Review of third generation mobile system security architecture
    • Horn, G.; Howard, P. (2000). Review of third generation mobile system security architecture. ISSE.
    • (2000) ISSE
    • Horn, G.1    Howard, P.2
  • 11
    • 33744500005 scopus 로고    scopus 로고
    • Authentication and key agreement protocol for UMTS with low bandwidth consumption
    • Huang, C.-M.; Li, J.-W. (2005). Authentication and key agreement protocol for UMTS with low bandwidth consumption. In Proceedings of the 19th international conference AINA (pp. 392-397).
    • (2005) Proceedings of the 19th International Conference AINA , pp. 392-397
    • Huang, C.-M.1    Li, J.-W.2
  • 12
    • 3042783229 scopus 로고    scopus 로고
    • A self-encryption mechanism for authentication of roaming and teleconference services
    • 10.1109/TWC.2003.809452 2029546
    • Hwang, K. F.; Chang, D. C. C. (2003). A self-encryption mechanism for authentication of roaming and teleconference services. Proceedings of the IEEE Transaction of the Wireless Communications, 2(2), 400-407.
    • (2003) Proceedings of the IEEE Transaction of the Wireless Communications , vol.2 , Issue.2 , pp. 400-407
    • Hwang, K.F.1    Chang, D.C.C.2
  • 15
    • 0032676481 scopus 로고    scopus 로고
    • Enhanced privacy and authentication for global system for mobile communications
    • Lee, C. H.; Hwang, M. S.; Yang, W. P. (1999). Enhanced privacy and authentication for global system for mobile communications. Proceedings of the Wireless Networks, 5, 231-243.
    • (1999) Proceedings of the Wireless Networks , vol.5 , pp. 231-243
    • Lee, C.H.1    Hwang, M.S.2    Yang, W.P.3
  • 17
    • 28544452660 scopus 로고    scopus 로고
    • Private authentication techniques for the global mobility network
    • 10.1007/s11277-005-6177-z
    • Lee, T.-F.; Chang, C. C.; Hwang, T. (2005). Private authentication techniques for the global mobility network. Wireless Personal Communications, 35(4), 329-336.
    • (2005) Wireless Personal Communications , vol.35 , Issue.4 , pp. 329-336
    • Lee, T.-F.1    Chang, C.C.2    Hwang, T.3
  • 21
    • 73149084427 scopus 로고    scopus 로고
    • A cocktail protocol with the authentication and key agreement on the UMTS
    • 10.1016/j.jss.2009.08.019
    • Ou, H.-H.; Hwang, M.-S.; Jan, J. K. (2010). A cocktail protocol with the authentication and key agreement on the UMTS. Proceedings of the Journal of Systems and Software, 83(2), 316-325.
    • (2010) Proceedings of the Journal of Systems and Software , vol.83 , Issue.2 , pp. 316-325
    • Ou, H.-H.1    Hwang, M.-S.2    Jan, J.K.3
  • 22
    • 0031257939 scopus 로고    scopus 로고
    • An authentication technique based on distributed security management for global mobility network
    • 10.1109/49.634798
    • Suzuki, S.; Nakanda, K. A. (1997). An authentication technique based on distributed security management for global mobility network. Proceedings of the IEEE Journal on Selected Areas in Communications, 15(8), 1608-1617.
    • (1997) Proceedings of the IEEE Journal on Selected Areas in Communications , vol.15 , Issue.8 , pp. 1608-1617
    • Suzuki, S.1    Nakanda, K.A.2
  • 24
    • 35048826772 scopus 로고    scopus 로고
    • Adaptive protocol for entity authentication and key agreement in mobile networks
    • Zhang, M. A. (2003). Adaptive protocol for entity authentication and key agreement in mobile networks. In Proceedings of the ICISC, 2003 (pp. 166-183).
    • (2003) Proceedings of the ICISC, 2003 , pp. 166-183
    • Zhang, M.A.1
  • 25
    • 83655166843 scopus 로고    scopus 로고
    • Provably-secure enhancement on 3GPP authentication and key agreement protocol verizon Commun
    • Zhang, M. (2003). Provably-secure enhancement on 3GPP authentication and key agreement protocol verizon Commun. In Proceedings of the cryptology ePrint archive Rep. 2003/092.
    • (2003) Proceedings of the Cryptology EPrint Archive Rep. 2003/092
    • Zhang, M.1
  • 26
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • 10.1109/TWC.2004.842941
    • Zhang, M.; Fang, Y. (2005). Security analysis and enhancements of 3GPP authentication and key agreement protocol. Proceedings of the IEEE Transactions on Wireless Communications, 4(2), 734-742.
    • (2005) Proceedings of the IEEE Transactions on Wireless Communications , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.1    Fang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.