메뉴 건너뛰기




Volumn 29, Issue 3-4 SPEC.ISS., 2004, Pages 351-366

Authentication and billing protocols for the Integration of WLAN and 3G networks

Author keywords

3G; Authentication; Billing; Cellular network; Security; WLAN

Indexed keywords

CODE DIVISION MULTIPLE ACCESS; DATA COMMUNICATION SYSTEMS; ELECTRONIC COMMERCE; NETWORK PROTOCOLS; QUALITY OF SERVICE; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS; TELECOMMUNICATION NETWORKS;

EID: 9144267125     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1023/B:WIRE.0000047070.38334.5e     Document Type: Article
Times cited : (24)

References (39)
  • 1
    • 9144257038 scopus 로고    scopus 로고
    • International Telecommunication Union (ITU), http://www.itu.int/home/imt.html.
  • 2
    • 9144257638 scopus 로고    scopus 로고
    • ETSI TS 122 060
    • General Packet Radio Services (GPRS) Service Description (Stage 2), ETSI TS 122 060, 2002.
    • (2002) Service Description (Stage 2)
  • 4
    • 0041594241 scopus 로고    scopus 로고
    • Wireless LAN media access control (MAC) and physical layer (PHY) specifications
    • ISO/IEC 8802-11
    • Wireless LAN media access control (MAC) and physical layer (PHY) specifications, ANSI/IEEE Std. 802.11: 1999 (E) Part 11, ISO/IEC 8802-11, 1999.
    • (1999) ANSI/IEEE Std. 802.11: 1999 (E) Part 11
  • 5
    • 0035507288 scopus 로고    scopus 로고
    • Wireless LAN access network architecture for mobile operators
    • November
    • J. Ala-Laurila, J. Mikkonen and J. Rinnemaa, "Wireless LAN access network architecture for mobile operators", IEEE Communications Magazine, 39(11):82-89, November 2001.
    • (2001) IEEE Communications Magazine , vol.39 , Issue.11 , pp. 82-89
    • Ala-Laurila, J.1    Mikkonen, J.2    Rinnemaa, J.3
  • 8
    • 0034467609 scopus 로고    scopus 로고
    • On the cost of virtual private networks
    • R. Cohen and G. Kaempfer, On the Cost of Virtual Private Networks, IEEE/ACM Transactions on Networking, Vol. 8, No. 6, pp. 775-784, 2000.
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.6 , pp. 775-784
    • Cohen, R.1    Kaempfer, G.2
  • 9
    • 0742317701 scopus 로고    scopus 로고
    • Virtual private networks
    • R. Venkateswaran, "Virtual Private Networks", IEEE Potentials, Vol. 20, No. 1, pp. 11-15, 2001.
    • (2001) IEEE Potentials , vol.20 , Issue.1 , pp. 11-15
    • Venkateswaran, R.1
  • 15
    • 0037376798 scopus 로고    scopus 로고
    • Introduction of the asymmetric Cryptography in GSM, GPRS, UMTS, and Its public key infrastructure integration
    • C.F. Grecas, S.I. Maniatis and I.S. Venieris, "Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration", Mobile Networks and Applications, Vol. 8, No. 2, pp. 145-150, 2003.
    • (2003) Mobile Networks and Applications , vol.8 , Issue.2 , pp. 145-150
    • Grecas, C.F.1    Maniatis, S.I.2    Venieris, I.S.3
  • 17
    • 9144271462 scopus 로고    scopus 로고
    • Advanced Security for Personal Communication Technologies (ASPeCT), http://www.esat.kuleuven.ac.be/cosic/aspect/aspect.html, 1998
    • Advanced Encryption Standard (AES), http://csrc.nist.gov/CryptoToolkit/aes/, 2001. Advanced Security for Personal Communication Technologies (ASPeCT), http://www.esat.kuleuven.ac.be/cosic/aspect/aspect.html, 1998.
    • (2001)
  • 18
    • 0034248479 scopus 로고    scopus 로고
    • Temporary mobile user certificate for mobile information services in UMTS
    • August
    • B.R. Lee, K.A. Chang and T.Y. Kim, "Temporary Mobile User Certificate for Mobile Information Services in UMTS", IEICE transactions on Communications, Vol. E83-B, No. 8, pp. 1880-1886, August 2000.
    • (2000) IEICE Transactions on Communications , vol.E83-B , Issue.8 , pp. 1880-1886
    • Lee, B.R.1    Chang, K.A.2    Kim, T.Y.3
  • 21
    • 0003218526 scopus 로고    scopus 로고
    • Remote authentication dial in user service (RADIUS)
    • June
    • C. Rigney, S. Willens, A. Rubens and W. Simpson, "Remote Authentication Dial in User Service (RADIUS)", IETF RFC 2865, June 2000.
    • (2000) IETF RFC , vol.2865
    • Rigney, C.1    Willens, S.2    Rubens, A.3    Simpson, W.4
  • 22
    • 0003218499 scopus 로고    scopus 로고
    • PPP extensible authentication protocol (EAP)
    • March
    • L. Blunk and J. Vollbrecht, "PPP Extensible Authentication Protocol (EAP)", IETF RFC 2284, March 1998.
    • (1998) IETF RFC , vol.2284
    • Blunk, L.1    Vollbrecht, J.2
  • 23
    • 0038065851 scopus 로고    scopus 로고
    • PPP EAP TLS authentication protocol
    • October
    • B. Aboba, and D. Simon, "PPP EAP TLS Authentication Protocol", IETF RFC 2716, October 1999.
    • (1999) IETF RFC , vol.2716
    • Aboba, B.1    Simon, D.2
  • 29
    • 0141518232 scopus 로고    scopus 로고
    • On the security methods for protecting password transmission
    • Y.M. Tseng, J.K. Jan and H.Y. Chien, "On the Security Methods for Protecting Password Transmission", Informatica, Vol. 12, No. 3, pp. 469-476, 2001.
    • (2001) Informatica , vol.12 , Issue.3 , pp. 469-476
    • Tseng, Y.M.1    Jan, J.K.2    Chien, H.Y.3
  • 30
    • 0036643547 scopus 로고    scopus 로고
    • Robust generalized MQV key agreement protocol without using one-way hash functions
    • Y.M. Tseng, "Robust Generalized MQV Key Agreement Protocol Without Using One-way Hash Functions", Computer Standards & Interfaces, Vol. 24, No. 3, pp. 241-246, 2002.
    • (2002) Computer Standards & Interfaces , vol.24 , Issue.3 , pp. 241-246
    • Tseng, Y.M.1
  • 31
    • 0037942544 scopus 로고    scopus 로고
    • Cryptanalysis of mutual authentication and key exchange for low power wireless communications
    • May
    • K. Shim, "Cryptanalysis of Mutual Authentication and Key Exchange for Low Power Wireless Communications", IEEE Communications Letters, Vol. 7, No. 5, pp. 248-250, May 2003.
    • (2003) IEEE Communications Letters , vol.7 , Issue.5 , pp. 248-250
    • Shim, K.1
  • 32
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password Authentication with Insecure Communication", Communication of ACM, Vol. 24, No. 11, pp. 770-772, 1981.
    • (1981) Communication of ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 33
    • 0033364756 scopus 로고    scopus 로고
    • Authentication protocols with nonrepudiation services in personal communication systems
    • H.Y. Lin and L. Harn, "Authentication Protocols with Nonrepudiation Services in Personal Communication Systems", IEEE Communications Letters, Vol. 3, No. 8, pp. 236-238, 1999.
    • (1999) IEEE Communications Letters , vol.3 , Issue.8 , pp. 236-238
    • Lin, H.Y.1    Harn, L.2
  • 36
    • 9144248802 scopus 로고    scopus 로고
    • Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Medium Access Method (MAC) Security Enhancements, IEEE P802.11i/D3.0, http://standards.ieee.org/reading/ieee/std/lanman/drafts/P802.11i.pdf
    • Sun Microsystems, http://java.sun.com Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Medium Access Method (MAC) Security Enhancements, IEEE P802.11i/D3.0, http://standards.ieee.org/reading/ieee/std/lanman/drafts/P802.11i.pdf.
  • 38
    • 0001849866 scopus 로고    scopus 로고
    • The status of MD5 after a recent attack
    • H. Dobbertin, "The status of MD5 after a Recent Attack", CryptoBytes, Vol. 2, No. 2, pp. 1-6, 1996.
    • (1996) CryptoBytes , vol.2 , Issue.2 , pp. 1-6
    • Dobbertin, H.1
  • 39
    • 84936033986 scopus 로고
    • The Digital Signature Standard (DSA) proposed by NIST, Communication of ACM, vol. 35, No. 7, pp. 36-40, 1992.
    • (1992) Communication of ACM , vol.35 , Issue.7 , pp. 36-40


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.