[[abstract]]Recently, Zhang and Fang proposed a security analysis and enhancements of 3GPP authentication and key agreement protocol (AP-AKA for short). The enhancements of 3GPP authentication and key agreement protocol is proposed to improve some drawbacks of the current third-generation wireless communications. It also eliminates the need of synchronization between a mobile station and its home network. However, this paper shows that AP-AKA has some drawbacks, including the huge bandwidth consumption between foreign network and the home network, and the overhead of the stored space in the foreign network, and the overloaded home network with authentication of mobile stations. As a result, an extension of AP-AKA is proposed, which improves...
[[abstract]]An efficient authentication protocol with low communication latency is crucial to the su...
International audienceProposed by the 3rd Generation Partnership Project (3GPP) as a standard for 3G...
[[abstract]]With rapid growth of mobile wireless networks, many mobile applications have received si...
Abstract—This paper analyzes the authentication and key agreement protocol adopted by Universal Mobi...
[[abstract]]In 2005, Zhang et al. proposed a novel authentication key agreement protocol for 3GPP-AK...
This thesis proposes an Authentication and Key Agreement (AKA) protocol meant to be a replacement of...
To provide secure communication for mobile devices, authenticated key agreement protocol is an impor...
The 3rd generation partnership project (3GPP) has been enhancing the security of the 5G AKA (authent...
Interworking wireless technologies such as the Wireless Local Area Network (WLAN), the Worldwide Int...
[[abstract]]Along with the popularization of third generation mobile communication system (3G), more...
The 4th generation (4G) mobile access network and the core network are evolving towards a secure, fa...
This research work analyzes the universal mobile telecommunication system (UMTS) authentication and ...
Abstract The security of mobile communication largely depends on the strength of the authentication...
[[abstract]]Considering the performance, encrypting the transmission message by the symmetric crypto...
Abstract. In this work, we consider Authentication and Key Agreement (AKA), a popular client-server ...
[[abstract]]An efficient authentication protocol with low communication latency is crucial to the su...
International audienceProposed by the 3rd Generation Partnership Project (3GPP) as a standard for 3G...
[[abstract]]With rapid growth of mobile wireless networks, many mobile applications have received si...
Abstract—This paper analyzes the authentication and key agreement protocol adopted by Universal Mobi...
[[abstract]]In 2005, Zhang et al. proposed a novel authentication key agreement protocol for 3GPP-AK...
This thesis proposes an Authentication and Key Agreement (AKA) protocol meant to be a replacement of...
To provide secure communication for mobile devices, authenticated key agreement protocol is an impor...
The 3rd generation partnership project (3GPP) has been enhancing the security of the 5G AKA (authent...
Interworking wireless technologies such as the Wireless Local Area Network (WLAN), the Worldwide Int...
[[abstract]]Along with the popularization of third generation mobile communication system (3G), more...
The 4th generation (4G) mobile access network and the core network are evolving towards a secure, fa...
This research work analyzes the universal mobile telecommunication system (UMTS) authentication and ...
Abstract The security of mobile communication largely depends on the strength of the authentication...
[[abstract]]Considering the performance, encrypting the transmission message by the symmetric crypto...
Abstract. In this work, we consider Authentication and Key Agreement (AKA), a popular client-server ...
[[abstract]]An efficient authentication protocol with low communication latency is crucial to the su...
International audienceProposed by the 3rd Generation Partnership Project (3GPP) as a standard for 3G...
[[abstract]]With rapid growth of mobile wireless networks, many mobile applications have received si...