F Wen, W Susilo, G Yang - Wireless personal communications, 2013 - Springer
In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous …
Abstract In 2012, Li and Lee (CT Li and CC Lee,“A novel user authentication and privacy preserving scheme with smart cards for wireless communications,” Mathematical and …
CH Ling, CC Lee, CC Yang, MS Hwang - Int. J. Netw. Secur., 2017 - academia.edu
An algorithm that a user has authenticated over remote devices should be designed to consider the limitations of computation and lower power in a wireless sensor networks …
A Elouafiq - arXiv preprint arXiv:1204.1651, 2012 - arxiv.org
Mobile communication touches every aspect of our life, it become one of the major dependencies that the 21st Century civilizations rely on. Thereby, security is a major issue …
W Khan, H Ullah - … Journal of Computer Science Issues (IJCSI), 2010 - researchgate.net
With its great features like providing access to users at anytime and anywhere in the world, mobile communication has been very attractive among the users as well as operators and …
F Wen, W Susilo, G Yang - Security and Communication …, 2014 - Wiley Online Library
Anonymous user authentication is an important but challenging task for wireless communications. In a recent paper, Das proposed a smart card‒based anonymous user …
CC Lee, IE Liao, MS Hwang - Telecommunication Systems, 2011 - Springer
In this paper, a new Global System of Mobile Communications (GSM) authentication protocol is proposed to improve some drawbacks of the current GSM authentication protocol …
Abstract Recently, Zhang and Fang proposed a security analysis and enhancements of 3GPP authentication and key agreement protocol (AP-AKA for short). The enhancements of …
CC Lee, IE Liao, MS Hwang - Information Technology and Control, 2009 - itc.ktu.lt
An optimized certificate-based protocol for mobile network with authentication and security has been proposed by Yi et al. This protocol allows efficient computation and less storage …