To provide secure communication for mobile devices, authenticated key agreement protocol is an important primitive for establishing session keys. However, most of the existing authenticated key agreement protocols are not designed for wireless mobile communication for which the bandwidth and the storage of the devices are limited. Also, mobile devices are more vulnerable to attack, providing forward secrecy would become an essential element in the protocol. In this paper, based on Seo and Sweeney's simple authenticated key agreement algorithm (SAKA), we develop an improved authenticated key agreement protocol that eliminates the disadvantages of SAKA and provides identity authentication, key validation, and perfect forward secrecy. Also, ou...
[[abstract]]Kerberos is a well-known network authentication mechanism. Based upon Kerberos' model, S...
To ensure secure mobile communication, the communicating entities must know their mutual identities....
In UMTS (Universal Mobile Telecommunication System), a protocol called UMTS AKA (Authentication and ...
[[abstract]]With rapid growth of mobile wireless networks, many mobile applications have received si...
[[abstract]]Considering the performance, encrypting the transmission message by the symmetric crypto...
Abstract—This paper analyzes the authentication and key agreement protocol adopted by Universal Mobi...
This paper proposes a secure authentication mechanism by integrating the public key with the hash-ch...
Since the radio medium can be accessed by anyone, authentication of users is a very important elemen...
[[abstract]]A group key agreement protocol enables a group of communicating parties over an untruste...
Abstract The security of mobile communication largely depends on the strength of the authentication...
[[abstract]]Recently, Zhang and Fang proposed a security analysis and enhancements of 3GPP authentic...
The security of mobile communication largely depends on the strength of the authentication key excha...
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the v...
Abstract. In this work, we consider Authentication and Key Agreement (AKA), a popular client-server ...
Setting up a common secret key for communications between two parties over insecure mobile communica...
[[abstract]]Kerberos is a well-known network authentication mechanism. Based upon Kerberos' model, S...
To ensure secure mobile communication, the communicating entities must know their mutual identities....
In UMTS (Universal Mobile Telecommunication System), a protocol called UMTS AKA (Authentication and ...
[[abstract]]With rapid growth of mobile wireless networks, many mobile applications have received si...
[[abstract]]Considering the performance, encrypting the transmission message by the symmetric crypto...
Abstract—This paper analyzes the authentication and key agreement protocol adopted by Universal Mobi...
This paper proposes a secure authentication mechanism by integrating the public key with the hash-ch...
Since the radio medium can be accessed by anyone, authentication of users is a very important elemen...
[[abstract]]A group key agreement protocol enables a group of communicating parties over an untruste...
Abstract The security of mobile communication largely depends on the strength of the authentication...
[[abstract]]Recently, Zhang and Fang proposed a security analysis and enhancements of 3GPP authentic...
The security of mobile communication largely depends on the strength of the authentication key excha...
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the v...
Abstract. In this work, we consider Authentication and Key Agreement (AKA), a popular client-server ...
Setting up a common secret key for communications between two parties over insecure mobile communica...
[[abstract]]Kerberos is a well-known network authentication mechanism. Based upon Kerberos' model, S...
To ensure secure mobile communication, the communicating entities must know their mutual identities....
In UMTS (Universal Mobile Telecommunication System), a protocol called UMTS AKA (Authentication and ...