메뉴 건너뛰기




Volumn 27, Issue 12, 2014, Pages 3600-3618

Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR

Author keywords

Authentication and key agreement protocols; Casper FDR; Heterogeneous networks

Indexed keywords

AUTHENTICATION; COMPUTER TERMINALS; CRYPTOGRAPHY; FORMAL METHODS; HETEROGENEOUS NETWORKS; LONG TERM EVOLUTION (LTE); MOBILE SECURITY; MOBILE TELECOMMUNICATION SYSTEMS; NEXT GENERATION NETWORKS; QUALITY OF SERVICE;

EID: 84914666586     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2561     Document Type: Article
Times cited : (4)

References (40)
  • 1
    • 84914678131 scopus 로고    scopus 로고
    • Internet Engineering Task Force. Handover keying working group (hokey wg). (Available from Accessed 06 August
    • Internet Engineering Task Force. Handover keying working group (hokey wg). (Available from: http://www.ietf.org/html.charters/hokey-charter.html) [Accessed 06 August 2012].
    • (2012)
  • 2
    • 84914678130 scopus 로고    scopus 로고
    • 3rd Generation Partnership Project (3GPP). (Available from Accessed 06 August
    • 3rd Generation Partnership Project (3GPP). (Available from: http://www.3gpp.org/) [Accessed 06 August 2012].
    • (2012)
  • 3
    • 84914678129 scopus 로고    scopus 로고
    • Institute of Electrical and Electronics Engineers. IEEE 802.21/D8.0 Draft Standard for Local and Metropolitan Area Networks: Media Independent Handover Services
    • Institute of Electrical and Electronics Engineers. IEEE 802.21/D8.0 Draft Standard for Local and Metropolitan Area Networks: Media Independent Handover Services, 2007.
    • (2007)
  • 11
    • 0029484376 scopus 로고
    • Modelling and verifying key-exchange protocols using CSP and FDR
    • County Kerry, Ireland
    • Roscoe AW. Modelling and verifying key-exchange protocols using CSP and FDR. 8th IEEE Computer Security Foundations Workshop, County Kerry, Ireland, 1995; 98-107.
    • (1995) 8th IEEE Computer Security Foundations Workshop , pp. 98-107
    • Roscoe, A.W.1
  • 13
    • 0007928023 scopus 로고    scopus 로고
    • Formal systems (Europe) Ltd.: Failures-Divergence Refinement Available from Accessed 19 August
    • Formal systems (Europe) Ltd.: Failures-Divergence Refinement. FDR2 User Manual. (Available from: http://www. fsel.com/documentation/fdr2/fdr2manual.pdf) [Accessed 19 August 2011].
    • (2011) FDR2 User Manual
  • 16
    • 84866907856 scopus 로고    scopus 로고
    • A QoS framework for heterogeneous networking
    • London, UK
    • Aiash M, Mapp G, Lasebae A. A QoS framework for heterogeneous networking. ICWN2011, London, UK, 2011.
    • (2011) ICWN2011
    • Aiash, M.1    Mapp, G.2    Lasebae, A.3
  • 17
    • 84914678128 scopus 로고    scopus 로고
    • International Telecommunication Union (ITU-T), Global Information Infrastructure. Internet protocol aspects and next generation networks Y.140.1
    • International Telecommunication Union (ITU-T), Global Information Infrastructure. Internet protocol aspects and next generation networks, 2004. Y.140.1.
    • (2004)
  • 20
    • 84914678125 scopus 로고    scopus 로고
    • The LTE/LTE Advanced Guidea semi-annual publication on LTE/LTE Advanced. (Available from
    • The LTE/LTE Advanced Guidea semi-annual publication on LTE/LTE Advanced. (Available from: http://lteportal. com/LTEBusinessGuide).
  • 23
    • 84881388540 scopus 로고    scopus 로고
    • Strong roaming authentication technique for wireless and mobile networks
    • Early view of an online version
    • He D, Chen C, Chan S, Bu J. Strong roaming authentication technique for wireless and mobile networks. International Journal of Communication Systems 2012. DOI: 10.1002/dac.1387. Early view of an online version.
    • (2012) International Journal of Communication Systems
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 24
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility network
    • Chen C, He D, Chan S, Bu J, Gao Y, Fan R. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2010; 24:347-362. DOI: 10.1002/dac.1158.
    • (2010) International Journal of Communication Systems , vol.24 , pp. 347-362
    • Chen, C.1    He, D.2    Chan, S.3    Bu, J.4    Gao, Y.5    Fan, R.6
  • 25
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • Qi X. A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems 2011; 25:47-54. DOI: 10.1002/dac.1286.
    • (2011) International Journal of Communication Systems , vol.25 , pp. 47-54
    • Qi, X.1
  • 26
    • 78649706743 scopus 로고    scopus 로고
    • CaTBUA: Context-aware ticket-based binding update authentication protocol for trust-enabled mobile networks
    • You I, Lee J-H, Kim B, Ilsun Y, Jong-Hyouk L, Bonam K. caTBUA: context-aware ticket-based binding update authentication protocol for trust-enabled mobile networks. International Journal of Communication Systems 2010; 23:1382-1404. DOI: 10.1002/dac.1113.
    • (2010) International Journal of Communication Systems , vol.23 , pp. 1382-1404
    • You, I.1    Lee, J.-H.2    Kim, B.3    Ilsun, Y.4    Jong-Hyouk, L.5    Bonam, K.6
  • 32
    • 1842853611 scopus 로고    scopus 로고
    • draft-riegel-tuexen-mobile-sctp-05.txt
    • Riegel M, Tuexen M. Mobile SCTP, 2005. draft-riegel-tuexen-mobile-sctp-05.txt.
    • (2005) Mobile SCTP
    • Riegel, M.1    Tuexen, M.2
  • 35
    • 85013734607 scopus 로고    scopus 로고
    • Bulletproof wireless security: GSM, UMTS, 802.11 and ad hoc security
    • Oxford
    • Chandra P. Bulletproof wireless security: GSM, UMTS, 802.11 and ad hoc security, Newnes. Oxford, 2005. 129-158, 2005.
    • (2005) Newnes , vol.2005 , pp. 129-158
    • Chandra, P.1
  • 36
    • 77955410807 scopus 로고    scopus 로고
    • Providing security in 4G systems: Unveiling the challenges
    • Barcelona, Spain May 9-15
    • Aiash M, Mapp G, Lasebae A, Phan R. Providing security in 4G systems: Unveiling the challenges. AICT 2010, Barcelona, Spain, 2010; 439-444. May 9-15, 2010.
    • (2010) AICT 2010 , pp. 439-444
    • Aiash, M.1    Mapp, G.2    Lasebae, A.3    Phan, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.