An extended certificate-based authentication and security protocol for mobile networks

CC Lee, IE Liao, MS Hwang - Information Technology and Control, 2009 - itc.ktu.lt
An optimized certificate-based protocol for mobile network with authentication and security
has been proposed by Yi et al. This protocol allows efficient computation and less storage …

On certificate-based security protocols for wireless mobile communication systems

CS Park - IEEE Network, 1997 - ieeexplore.ieee.org
Mutual authentication and session key exchange protocols based on certificates for the
wireless mobile communication/computing system are proposed. First, two improved …

[PDF][PDF] A certificate-based light-weight authentication algorithm for resource-constrained devices

A Roy-Chowdhury, J Baras - … of Maryland College Park, Tech. Rep …, 2005 - academia.edu
In this work, we analyze and extend a recently proposed design of digital certificates called
TESLA certificates. Certificates are a necessary tool in today's secure networks to certify the …

Cluster-based certificate chain for mobile ad hoc networks

GB Hahn, T Kwon, SK Kim, JS Song - International Conference on …, 2006 - Springer
A recent trend of wireless technology is to set up the wireless connections among close-by
mobile nodes. This class of network is called as Mobile Ad Hoc Network (MANET). In …

An authentication and key agreement mechanism for multi-domain wireless networks using certificateless public-key cryptography

M Luo, H Zhao - Wireless Personal Communications, 2015 - Springer
With rapid growth of mobile wireless networks, handheld devices are popularly used by
people and many mobile applications have been rapidly developed. Mutual authentication …

An improved certificateless authenticated key agreement protocol

H Yang, Y Zhang, Y Zhou - 2012 IEEE 14th International …, 2012 - ieeexplore.ieee.org
Recently, Mokhtarnameh, Ho, Muthuvelu proposed a certificateless key agreement protocol.
In this paper, we show that their protocol is unsecured against a man-in-the-middle attack. In …

Development and evaluation of a certificate validation system in mobile environments

K Umezawa, S Susaki, S Tezuka… - IEEJ Transactions on …, 2007 - Wiley Online Library
We have developed a public key certificate validation system considering the restrictions
peculiar to the mobile environment, such as processing the speed and memory capacity of a …

An improved certificateless public key authentication scheme for mobile ad hoc networks over Elliptic Curves

S Kasra-Kermanshahi, M Salleh - … , Intelligent Security and the Internet of …, 2015 - Springer
Due to the resource constrained property of mobile ad hoc networks (MANETs), making their
application more lightweight is one of the challenging issues. In this area, there exists a …

[PDF][PDF] Distributed certificate management in mobile ad hoc networks

M Masdari, J Pashaei - International Journal of Applied Information …, 2012 - academia.edu
ABSTRACT PKI or public key infrastructure is used many security solutions that are
designed for mobile ad hoc networks. These networks have special features that distinguish …

A secure mobile ad hoc network based on distributed certificate authority

SA Hosseini Seno, R Budiarto, TC Wan - Arabian Journal for Science and …, 2011 - Springer
The characteristics of mobile ad hoc networks (MANETs) such as dynamic changing
topology, lack of centralized management, and the vulnerability of links, have made …