Authentication of mobile users

R Molva, D Samfat, G Tsudik - IEEE Network, 1994 - ieeexplore.ieee.org
The goal of the paper is to propose a general approach for the authentication of users in
remote domains while maintaining strict separation of security domains. The article begins …

A mobile host protocol supporting route optimization and authentication

A Myles, DB Johnson, C Perkins - IEEE Journal on Selected …, 1995 - ieeexplore.ieee.org
Host mobility is becoming an important issue due to the recent proliferation of notebook and
palmtop computers, the development of wireless network interfaces, and the growth in …

Privacy and authentication for wireless local area networks

A Aziz, W Diffie - IEEE Personal Communications, 1994 - ieeexplore.ieee.org
Wireless networks are being driven by the need for providing network access to mobile or
nomadic computing devices. Although the need for wireless access to a network is evident …

Extensions to an authentication technique proposed for the global mobility network

L Buttyan, C Gbaguidi, S Staamann… - IEEE Transactions on …, 2000 - ieeexplore.ieee.org
We present three attacks on the authentication protocol that has been proposed for the so-
called global mobility network in the October 1997 issue of the IEEE Journal on Selected …

Enhanced authentication scheme with anonymity for roaming service in global mobility networks

CC Chang, CY Lee, YC Chiu - Computer Communications, 2009 - Elsevier
User authentication is an important security mechanism for recognizing legal roaming users.
In 2006, Lee, Hwang, and Liao proposed an enhanced authentication scheme with user …

Authentication using multiple communication channels

S Mizuno, K Yamada, K Takahashi - … of the 2005 workshop on Digital …, 2005 - dl.acm.org
We discuss an authentication method using multiple communication channels. This method
enables on-line service providers to strongly authenticate their users on a non-trusted …

A self-encryption mechanism for authentication of roaming and teleconference services

KF Hwang, CC Chang - IEEE Transactions on Wireless …, 2003 - ieeexplore.ieee.org
A simple authentication technique for use in the global mobility network (GLOMONET) is
proposed. This technique is based on the concept of distributed security management, ie …

Authentication protocols for mobile network environment value-added services

G Horn, KM Martin, CJ Mitchell - IEEE Transactions on …, 2002 - ieeexplore.ieee.org
The secure provision of mobile computing and telecommunication services is rapidly
increasing in importance as both demand and applications for such services continue to …

Improving mobile authentication with new AAA protocols

H Kim, H Afifi - … Conference on Communications, 2003. ICC'03., 2003 - ieeexplore.ieee.org
The rapid growth of wireless technology and the increasing use of such technologies in
coordination with the Internet demand a very careful look at issues related to security. As …

A user authentication scheme not requiring secrecy in the computer

A Evans Jr, W Kantrowitz, E Weiss - Communications of the ACM, 1974 - dl.acm.org
In many computer operating systems a user authenticates himself by entering a secret
password known solely to himself and the system. The system compares this password with …