[[abstract]]An optimized certificate-based protocol for mobile network with authentication and security has been proposed by Yi et al. This protocol allows efficient computation and less storage requirement in the mobile device. As a result, less power is consumed in the mobile device. However, in 1999, 2002, and 2003, Martin et al., Wong, and Laih et al. respectively showed that Yi et al.’s scheme is vulnerable to some attacks, but did not remedy these attacks. In this paper, we propose an improved protocol to remedy these attacks. Using the new protocol, the protection against attacks can be assured. The security of the key distribution on the mobile network is enhanced as well
Though Mobile Cloud Computing (MCC) and Mobile Edge Computing (MEC) technologies have brought more c...
To provide secure communication for mobile devices, authenticated key agreement protocol is an impor...
Certificate-based authentication of parties provides a powerful means for verifying claimed identiti...
[[abstract]]An optimized certificate-based protocol for mobile network with authentication and secur...
[[abstract]]Several years ago, handheld devices were regarded luxuries. But they are almost taking t...
[[abstract]]This paper proposes a new efficient authentication protocol for mobile networks. The use...
[[abstract]]Considering the low-power computing capability of mobile devices, the security scheme de...
Mobile communication network has brought us great convenience. However, network security issues are ...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...
[[abstract]]User authentication is an important security mechanism for recognizing legal roaming use...
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically, mobi...
Recently, Islam and Biswas proposed a pairing-free identity-based authenticated group key agreement ...
[[abstract]]Yi et al. presented a protocol for mobile network authentication and key distribution ba...
[[abstract]]This paper shows that Tzeng and Tzeng’s protocol has a drawback that the protocol can be...
[[abstract]]Abstract. With the rapid development of wireless communication technologies, mobile netw...
Though Mobile Cloud Computing (MCC) and Mobile Edge Computing (MEC) technologies have brought more c...
To provide secure communication for mobile devices, authenticated key agreement protocol is an impor...
Certificate-based authentication of parties provides a powerful means for verifying claimed identiti...
[[abstract]]An optimized certificate-based protocol for mobile network with authentication and secur...
[[abstract]]Several years ago, handheld devices were regarded luxuries. But they are almost taking t...
[[abstract]]This paper proposes a new efficient authentication protocol for mobile networks. The use...
[[abstract]]Considering the low-power computing capability of mobile devices, the security scheme de...
Mobile communication network has brought us great convenience. However, network security issues are ...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...
[[abstract]]User authentication is an important security mechanism for recognizing legal roaming use...
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically, mobi...
Recently, Islam and Biswas proposed a pairing-free identity-based authenticated group key agreement ...
[[abstract]]Yi et al. presented a protocol for mobile network authentication and key distribution ba...
[[abstract]]This paper shows that Tzeng and Tzeng’s protocol has a drawback that the protocol can be...
[[abstract]]Abstract. With the rapid development of wireless communication technologies, mobile netw...
Though Mobile Cloud Computing (MCC) and Mobile Edge Computing (MEC) technologies have brought more c...
To provide secure communication for mobile devices, authenticated key agreement protocol is an impor...
Certificate-based authentication of parties provides a powerful means for verifying claimed identiti...