[[abstract]]In 2004, Long et al. proposed a new public key certification structure to implement a localised authentication scheme by modifying the SSL protocol v3.0. Their scheme keeps the user's identity concealed and minimises the influence of the home network's failure and the overhead of having the legal user authenticated by its home network. Unfortunately, the privacy of the roaming user and the round efficiency in Long et al.'s scheme are doubted. In this paper, the authors present an improved version conserving the advantages of Long et al.'s scheme, ensuring round efficiency and providing both mutual authentication and key agreement
[[abstract]]In 2005, Zhang et al. proposed a novel authentication key agreement protocol for 3GPP-AK...
[[abstract]]In this paper, a new Global System of Mobile Communications (GSM) authentication protoco...
[[abstract]]In ubiquitous computing environments, people may obtain their services from application ...
Mobile communication network has brought us great convenience. However, network security issues are ...
Many novel, effective, and efficient applications and networking services are being developed for th...
[[abstract]]This paper proposes a new efficient authentication protocol for mobile networks. The use...
[[abstract]]In this papecr, we propose a new privacy and authentication scheme for end-to-end mobile...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
[[abstract]]Abstract. With the rapid development of wireless communication technologies, mobile netw...
Abstract-This paper proposed classification of security for authentication process for a roaming use...
[[abstract]]Considering the low-power computing capability of mobile devices, the security scheme de...
corresponding author Abstract. An optimized certificate-based protocol for mobile network with authe...
[[abstract]]In this paper, we propose a practical and secure authentication and key agreement (AKA) ...
In a mobile environment, a number of users act as a network nodes and communicate with one another t...
Internetworks of the future will allow and promote universal access. Network users will be able to a...
[[abstract]]In 2005, Zhang et al. proposed a novel authentication key agreement protocol for 3GPP-AK...
[[abstract]]In this paper, a new Global System of Mobile Communications (GSM) authentication protoco...
[[abstract]]In ubiquitous computing environments, people may obtain their services from application ...
Mobile communication network has brought us great convenience. However, network security issues are ...
Many novel, effective, and efficient applications and networking services are being developed for th...
[[abstract]]This paper proposes a new efficient authentication protocol for mobile networks. The use...
[[abstract]]In this papecr, we propose a new privacy and authentication scheme for end-to-end mobile...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
[[abstract]]Abstract. With the rapid development of wireless communication technologies, mobile netw...
Abstract-This paper proposed classification of security for authentication process for a roaming use...
[[abstract]]Considering the low-power computing capability of mobile devices, the security scheme de...
corresponding author Abstract. An optimized certificate-based protocol for mobile network with authe...
[[abstract]]In this paper, we propose a practical and secure authentication and key agreement (AKA) ...
In a mobile environment, a number of users act as a network nodes and communicate with one another t...
Internetworks of the future will allow and promote universal access. Network users will be able to a...
[[abstract]]In 2005, Zhang et al. proposed a novel authentication key agreement protocol for 3GPP-AK...
[[abstract]]In this paper, a new Global System of Mobile Communications (GSM) authentication protoco...
[[abstract]]In ubiquitous computing environments, people may obtain their services from application ...