corresponding author Abstract. An optimized certificate-based protocol for mobile network with authentication and security has been pro-posed by Yi et al. This protocol allows efficient computation and less storage requirement in the mobile device. As a result, less power is consumed in the mobile device. However, in 1999, 2002, and 2003, Martin et al., Wong, and Laih et al. respec-tively showed that Yi et al.’s scheme is vulnerable to some attacks, but did not remedy these attacks. In this paper, we propose an improved protocol to remedy these attacks. Using the new protocol, the protection against attacks can be assured. The security of the key distribution on the mobile network is enhanced as well
The convenience of mobile network makes it an indispensable part of modern life. A lot of important ...
Abstract. Certificate-based authentication of parties provides a power-ful means for verifying claim...
Since the early 1990s public-key certificate issuance has involved verifying users' identities and p...
[[abstract]]An optimized certificate-based protocol for mobile network with authentication and secur...
[[abstract]]An optimized certificate-based protocol for mobile network with authentication and secur...
[[abstract]]This paper proposes a new efficient authentication protocol for mobile networks. The use...
Mobile communication network has brought us great convenience. However, network security issues are ...
[[abstract]]Considering the low-power computing capability of mobile devices, the security scheme de...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...
Certificate-based authentication of parties provides a powerful means for verifying claimed identiti...
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically, mobi...
To provide secure communication for mobile devices, authenticated key agreement protocol is an impor...
We propose mutual authentication and session key exchange protocols based on certificates for the In...
This paper proposes a secure authentication mechanism by integrating the public key with the hash-ch...
[[abstract]]Yi et al. presented a protocol for mobile network authentication and key distribution ba...
The convenience of mobile network makes it an indispensable part of modern life. A lot of important ...
Abstract. Certificate-based authentication of parties provides a power-ful means for verifying claim...
Since the early 1990s public-key certificate issuance has involved verifying users' identities and p...
[[abstract]]An optimized certificate-based protocol for mobile network with authentication and secur...
[[abstract]]An optimized certificate-based protocol for mobile network with authentication and secur...
[[abstract]]This paper proposes a new efficient authentication protocol for mobile networks. The use...
Mobile communication network has brought us great convenience. However, network security issues are ...
[[abstract]]Considering the low-power computing capability of mobile devices, the security scheme de...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...
Certificate-based authentication of parties provides a powerful means for verifying claimed identiti...
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically, mobi...
To provide secure communication for mobile devices, authenticated key agreement protocol is an impor...
We propose mutual authentication and session key exchange protocols based on certificates for the In...
This paper proposes a secure authentication mechanism by integrating the public key with the hash-ch...
[[abstract]]Yi et al. presented a protocol for mobile network authentication and key distribution ba...
The convenience of mobile network makes it an indispensable part of modern life. A lot of important ...
Abstract. Certificate-based authentication of parties provides a power-ful means for verifying claim...
Since the early 1990s public-key certificate issuance has involved verifying users' identities and p...