[[abstract]]This paper proposes a new efficient authentication protocol for mobile networks. The user, service provider and key distribution center authenticate mutually in the proposed protocol. In addition, the user and service provider will generate a secret session key for communication in this protocol. We prove the proposed protocol by using BAN logic. In our protocol, the key distribution center of the networks does not need to maintain the secret key database of users by using the key derivation function. The proposed protocol is based on symmetric cryptosystem, challenge–response and hash chaining. It only needs four message exchange rounds for intra-domain initial phase and seven message exchange rounds for inter-domain initial ph...
With the advancement in Internet-based technologies, network applications are no longer just limited...
With the rapid development in wireless communications and cloud computing technologies, clients (use...
Many novel, effective, and efficient applications and networking services are being developed for th...
This paper proposes a secure authentication mechanism by integrating the public key with the hash-ch...
This paper proposes a key exchange protocol with mutual authentication, which requires only 0.1 modu...
[[abstract]]Considering the low-power computing capability of mobile devices, the security scheme de...
corresponding author Abstract. An optimized certificate-based protocol for mobile network with authe...
[[abstract]]Today, the Global System for Mobile Communications (GSM) is widely recognised as the mod...
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically, mobi...
[[abstract]]Kerberos is a well-known network authentication mechanism. Based upon Kerberos' model, S...
Mobile communication network has brought us great convenience. However, network security issues are ...
[[abstract]]In 2004, Long et al. proposed a new public key certification structure to implement a lo...
An authentication protocol allows on-line service providers to validate the identity or legitimacy o...
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the v...
In this paper we propose and design key authentication protocols for wireless networks. We consider ...
With the advancement in Internet-based technologies, network applications are no longer just limited...
With the rapid development in wireless communications and cloud computing technologies, clients (use...
Many novel, effective, and efficient applications and networking services are being developed for th...
This paper proposes a secure authentication mechanism by integrating the public key with the hash-ch...
This paper proposes a key exchange protocol with mutual authentication, which requires only 0.1 modu...
[[abstract]]Considering the low-power computing capability of mobile devices, the security scheme de...
corresponding author Abstract. An optimized certificate-based protocol for mobile network with authe...
[[abstract]]Today, the Global System for Mobile Communications (GSM) is widely recognised as the mod...
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically, mobi...
[[abstract]]Kerberos is a well-known network authentication mechanism. Based upon Kerberos' model, S...
Mobile communication network has brought us great convenience. However, network security issues are ...
[[abstract]]In 2004, Long et al. proposed a new public key certification structure to implement a lo...
An authentication protocol allows on-line service providers to validate the identity or legitimacy o...
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the v...
In this paper we propose and design key authentication protocols for wireless networks. We consider ...
With the advancement in Internet-based technologies, network applications are no longer just limited...
With the rapid development in wireless communications and cloud computing technologies, clients (use...
Many novel, effective, and efficient applications and networking services are being developed for th...