[HTML][HTML] A novel user authentication and privacy preserving scheme with smart cards for wireless communications

CT Li, CC Lee - Mathematical and Computer Modelling, 2012 - Elsevier
In recent years, several user authentication schemes with smart cards for wireless
communication environments have been proposed. In 2010, He, Ma, Zhang, Chen, and Bu …

A secure and effective anonymous user authentication scheme for roaming service in global mobility networks

F Wen, W Susilo, G Yang - Wireless personal communications, 2013 - Springer
In global mobility networks, anonymous user authentication is an essential task for enabling
roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous …

A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications

AK Das - Networking Science, 2013 - Springer
Abstract In 2012, Li and Lee (CT Li and CC Lee,“A novel user authentication and privacy
preserving scheme with smart cards for wireless communications,” Mathematical and …

[PDF][PDF] A Secure and Efficient One-time Password Authentication Scheme for WSN.

CH Ling, CC Lee, CC Yang, MS Hwang - Int. J. Netw. Secur., 2017 - academia.edu
An algorithm that a user has authenticated over remote devices should be designed to
consider the limitations of computation and lower power in a wireless sensor networks …

Authentication and Encryption in GSM and 3GUMTS: An Emphasis on Protocols and Algorithms

A Elouafiq - arXiv preprint arXiv:1204.1651, 2012 - arxiv.org
Mobile communication touches every aspect of our life, it become one of the major
dependencies that the 21st Century civilizations rely on. Thereby, security is a major issue …

[PDF][PDF] Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography

W Khan, H Ullah - … Journal of Computer Science Issues (IJCSI), 2010 - researchgate.net
With its great features like providing access to users at anytime and anywhere in the world,
mobile communication has been very attractive among the users as well as operators and …

A robust smart card‒based anonymous user authentication protocol for wireless communications

F Wen, W Susilo, G Yang - Security and Communication …, 2014 - Wiley Online Library
Anonymous user authentication is an important but challenging task for wireless
communications. In a recent paper, Das proposed a smart card‒based anonymous user …

An efficient authentication protocol for mobile communications

CC Lee, IE Liao, MS Hwang - Telecommunication Systems, 2011 - Springer
In this paper, a new Global System of Mobile Communications (GSM) authentication
protocol is proposed to improve some drawbacks of the current GSM authentication protocol …

Extension of an efficient 3GPP authentication and key agreement protocol

CC Lee, CL Chen, HH Ou, LA Chen - Wireless Personal Communications, 2013 - Springer
Abstract Recently, Zhang and Fang proposed a security analysis and enhancements of
3GPP authentication and key agreement protocol (AP-AKA for short). The enhancements of …

An extended certificate-based authentication and security protocol for mobile networks

CC Lee, IE Liao, MS Hwang - Information Technology and Control, 2009 - itc.ktu.lt
An optimized certificate-based protocol for mobile network with authentication and security
has been proposed by Yi et al. This protocol allows efficient computation and less storage …