Abstract — Through the combination of the public-key digi-tal signature and the hash-chaining techniques, a new set of authentication protocols is proposed with the capability of ar-bitrating disputed bills. These protocols provide security services required by regular authentication protocols and are efficient in consideration of the specific Personal Communication Systems (PCS) environment. They protect subscribers from incorrect service charges and provide service providers legal evidences to collect bills that are denied. They also help identify whether an accounting error, an internal fraud, or a security breach of the service provider causes the incorrect service charge. Index Terms—Authentication, cryptography, nonrepudiation, PCS
This paper proposes a secure authentication mechanism by integrating the public key with the hash-ch...
We analyse two new and related families of authentication protocols, where a party wants to authenti...
One of the main challenges in pervasive computing is how we can establish secure communication over ...
This standard specifies two challenge-response protocols by which entities in a computer system may ...
Digital portable communications systems (PCS) use cryptographic security techniques to provide priva...
[[abstract]]Owing to the rapid development of microelectronics techniques, the computation power of ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
The advent of personal communication systems within the last decade has depended upon the utilizatio...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
. Non-repudiation is one of the most important security services. In this paper we present a novel n...
Theft of communication resources in public telephone access networks is a problem for many operators...
Abstract:- The increasing usage of internet-based services, such as certified e-mails, electronic pa...
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifical...
In a typical roaming scenario the accounting information received from the roaming partner is expect...
This paper proposes a secure authentication mechanism by integrating the public key with the hash-ch...
We analyse two new and related families of authentication protocols, where a party wants to authenti...
One of the main challenges in pervasive computing is how we can establish secure communication over ...
This standard specifies two challenge-response protocols by which entities in a computer system may ...
Digital portable communications systems (PCS) use cryptographic security techniques to provide priva...
[[abstract]]Owing to the rapid development of microelectronics techniques, the computation power of ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
The advent of personal communication systems within the last decade has depended upon the utilizatio...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
. Non-repudiation is one of the most important security services. In this paper we present a novel n...
Theft of communication resources in public telephone access networks is a problem for many operators...
Abstract:- The increasing usage of internet-based services, such as certified e-mails, electronic pa...
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifical...
In a typical roaming scenario the accounting information received from the roaming partner is expect...
This paper proposes a secure authentication mechanism by integrating the public key with the hash-ch...
We analyse two new and related families of authentication protocols, where a party wants to authenti...
One of the main challenges in pervasive computing is how we can establish secure communication over ...