This contribution discusses algorithms for strong authentication of applications in mobile devices. The current LTE and IMS networks provide strong authentication using USIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole control of Telco operators. We can expect that more applications will be placed into the IMS environment in the future. These applications will be based either on SIP (video on demand etc.) or HTTP-based protocols (e.g. as government applications or banking applications etc.). They will be provided not only by Telco operators, but also especially by independent third parties - application (content) providers (e.g. government, banks etc.). This contributio...
The convenience of mobile network makes it an indispensable part of modern life. A lot of important ...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
Bachelor’s thesis describes the basics of authentication methods by knowledge, used authentication t...
4G networks to utilize Voice over LTE (VoLTE). VoLTE uses similar authentication mechanisms such as ...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
As the functionality and services provided by mobile devices increases, the need to provide effectiv...
Nowadays weak single-factor authentication mechanisms like passwords or passphrases are commonly use...
With high risk services, such as online banking, coming to the Internet, traditional authentication ...
Today the Internet is mostly used for services that require low or none security. The commercial and...
The telecommunications industry covers various sectors and services such as broadband, telecom equip...
In today’s digital communication era, people around the world can conveniently communicate with eac...
Traditionally, the authentication protocols for cellular phone networks have been designed for devic...
This paper proposes a secure authentication mechanism by integrating the public key with the hash-ch...
[[abstract]]In this paper, we propose a practical and secure authentication and key agreement (AKA) ...
The rapid advancement and the wide-spread use of the Internet and wireless communications in our pro...
The convenience of mobile network makes it an indispensable part of modern life. A lot of important ...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
Bachelor’s thesis describes the basics of authentication methods by knowledge, used authentication t...
4G networks to utilize Voice over LTE (VoLTE). VoLTE uses similar authentication mechanisms such as ...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
As the functionality and services provided by mobile devices increases, the need to provide effectiv...
Nowadays weak single-factor authentication mechanisms like passwords or passphrases are commonly use...
With high risk services, such as online banking, coming to the Internet, traditional authentication ...
Today the Internet is mostly used for services that require low or none security. The commercial and...
The telecommunications industry covers various sectors and services such as broadband, telecom equip...
In today’s digital communication era, people around the world can conveniently communicate with eac...
Traditionally, the authentication protocols for cellular phone networks have been designed for devic...
This paper proposes a secure authentication mechanism by integrating the public key with the hash-ch...
[[abstract]]In this paper, we propose a practical and secure authentication and key agreement (AKA) ...
The rapid advancement and the wide-spread use of the Internet and wireless communications in our pro...
The convenience of mobile network makes it an indispensable part of modern life. A lot of important ...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
Bachelor’s thesis describes the basics of authentication methods by knowledge, used authentication t...