[[abstract]]This paper shows that Tzeng and Tzeng’s protocol has a drawback that the protocol can be easily crashed by an evil VLR attack. Therefore, we propose a slight modification to their protocol to improve their shortcoming. As a result, our protocol does not only enhance the security of Tzeng and Tzeng’s protocol but also improves the efficiency
An authentication protocol allows on-line service providers to validate the identity or legitimacy o...
[[abstract]]An extension of the authentication protocol for GSM is proposed to improve some drawback...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...
Abstract This paper shows that Tzeng and Tzeng’s proto-col has a drawback that the protocol can be e...
[[abstract]]An optimized certificate-based protocol for mobile network with authentication and secur...
Mobile communication network has brought us great convenience. However, network security issues are ...
[[abstract]]An optimized certificate-based protocol for mobile network with authentication and secur...
[[abstract]]With the rapid development of Internet service the client/server architecture, a lot of ...
The communication between cell phones and sensor networks involves strong user authentication protoc...
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in ...
[[abstract]]Abstract. With the rapid development of wireless communication technologies, mobile netw...
The convenience of mobile network makes it an indispensable part of modern life. A lot of important ...
[[abstract]]This paper proposes a new efficient authentication protocol for mobile networks. The use...
Abstract-.This paper analyzes the authentication and key agreement (AKA) protocol for Universal Mobi...
[[abstract]]In a paper recently published in the IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, Zhu and ...
An authentication protocol allows on-line service providers to validate the identity or legitimacy o...
[[abstract]]An extension of the authentication protocol for GSM is proposed to improve some drawback...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...
Abstract This paper shows that Tzeng and Tzeng’s proto-col has a drawback that the protocol can be e...
[[abstract]]An optimized certificate-based protocol for mobile network with authentication and secur...
Mobile communication network has brought us great convenience. However, network security issues are ...
[[abstract]]An optimized certificate-based protocol for mobile network with authentication and secur...
[[abstract]]With the rapid development of Internet service the client/server architecture, a lot of ...
The communication between cell phones and sensor networks involves strong user authentication protoc...
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in ...
[[abstract]]Abstract. With the rapid development of wireless communication technologies, mobile netw...
The convenience of mobile network makes it an indispensable part of modern life. A lot of important ...
[[abstract]]This paper proposes a new efficient authentication protocol for mobile networks. The use...
Abstract-.This paper analyzes the authentication and key agreement (AKA) protocol for Universal Mobi...
[[abstract]]In a paper recently published in the IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, Zhu and ...
An authentication protocol allows on-line service providers to validate the identity or legitimacy o...
[[abstract]]An extension of the authentication protocol for GSM is proposed to improve some drawback...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...