Mobile services are spread throughout the wireless network and are one of the crucial components needed for various applications and services. However, the security of mobile communication has topped the list of concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication. Currently available network security mechanisms are inadequate; hence there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism. Traditionally, the security services have been provided by cryptography. Recently, techniques based on elliptic curve cryptography (ECC) have demonstrated the feasibility of providing computer security services e...
Electronic commerce transactions on mobile devices develops rapidly and are implemented on Internet ...
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically, mobi...
The design of secure remote user authentication schemes for mobile applications is still an open an...
[[abstract]]Abstract. With the rapid development of wireless communication technologies, mobile netw...
In wireless mobile networks, a client can move between different locations while staying connected t...
[[abstract]]Recently, Elliptic Curve Cryptosystem (ECC) based remote authentication scheme has been ...
Due to recent advances in wireless communication, the availability of mobile services has increased ...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...
Open networks enable data communication between different types of mobile devices that showcase the ...
Secure and efficient mutual authentication and key agreement schemes form the basis for any robust n...
[[abstract]]Considering the performance, encrypting the transmission message by the symmetric crypto...
A NOVEL PASSWORDLESS AUTHENTICATION SCHEME FOR SMART PHONES USING ELLIPTIC CURVE CRYPTOGRAPHY Today...
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement sc...
Abstract. This paper describes a secure identity based deniable authen-tication protocol whose secur...
Electronic commerce transactions on mobile devices develops rapidly and are implemented on Internet ...
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically, mobi...
The design of secure remote user authentication schemes for mobile applications is still an open an...
[[abstract]]Abstract. With the rapid development of wireless communication technologies, mobile netw...
In wireless mobile networks, a client can move between different locations while staying connected t...
[[abstract]]Recently, Elliptic Curve Cryptosystem (ECC) based remote authentication scheme has been ...
Due to recent advances in wireless communication, the availability of mobile services has increased ...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...
Open networks enable data communication between different types of mobile devices that showcase the ...
Secure and efficient mutual authentication and key agreement schemes form the basis for any robust n...
[[abstract]]Considering the performance, encrypting the transmission message by the symmetric crypto...
A NOVEL PASSWORDLESS AUTHENTICATION SCHEME FOR SMART PHONES USING ELLIPTIC CURVE CRYPTOGRAPHY Today...
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement sc...
Abstract. This paper describes a secure identity based deniable authen-tication protocol whose secur...
Electronic commerce transactions on mobile devices develops rapidly and are implemented on Internet ...
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically, mobi...
The design of secure remote user authentication schemes for mobile applications is still an open an...