Security enhancement on a new authentication scheme with anonymity for wireless environments

CC Lee, MS Hwang, IE Liao - IEEE Transactions on Industrial …, 2006 - ieeexplore.ieee.org
In a paper recently published in the IEEE Transactions on Consumer Electronics, Zhu and
Ma proposed a new authentication scheme with anonymity for wireless environments …

A new authenticated group key agreement in a mobile environment

CC Lee, TH Lin, CS Tsai - annals of telecommunications-annales des …, 2009 - Springer
A group key agreement protocol enables a group of communicating parties over an
untrusted, open network to come up with a common secret key. It is designed to achieve …

A secure protocol for bluetooth piconets using elliptic curve cryptography

MS Hwang, CC Lee, JZ Lee, CC Yang - Telecommunication systems, 2005 - Springer
In this article, the authors shall propose a new method for the implementation of secure
Bluetooth piconets. Two requirements for the systems must be considered, ie, privacy and …

An extended certificate-based authentication and security protocol for mobile networks

CC Lee, IE Liao, MS Hwang - Information Technology and Control, 2009 - itc.ktu.lt
An optimized certificate-based protocol for mobile network with authentication and security
has been proposed by Yi et al. This protocol allows efficient computation and less storage …

A new authentication protocol based on pointer forwarding for mobile communications

CC Lee, MS Hwang, IE Liao - Wireless Communications and …, 2008 - Wiley Online Library
A frequently moving mobile user in GSM must re‐register at the HLR frequently, and,
therefore, the signaling traffic is overhead and HLR database update cost raised. In this …

[PDF][PDF] The UMTS-AKA protocols for intelligent transportation systems

HH Ou, MS Hwang, JK Jan - EURASIP Journal on Wireless …, 2005 - Springer
The integration of communication protocols into transport systems is a much adored
research area today. Much of seminal work has been reported on the topic of intelligent …

Protection of an intrusion detection engine with watermarking in ad hoc networks

A Mitrokotsa, N Komninos… - International Journal of …, 2010 - openaccess.city.ac.uk
Mobile ad hoc networks have received great attention in recent years, mainly due to the
evolution of wireless networking and mobile computing hardware. Nevertheless, many …

[PDF][PDF] Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications.

J Hu, H Xiong, Z Chen - Int. J. Netw. Secur., 2012 - ijns.jalaxy.com.tw
Seamless roaming is highly desirable for wireless communications, and security such as
authentication and privacy preserving of mobile users is challenging. Recently, Wu et al. and …

[PDF][PDF] Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network.

R Kandikattu, L Jacob - Int. J. Netw. Secur., 2010 - ijns.jalaxy.com.tw
Abstract Wireless Mesh Network (WMN) is advocated as the major supporting technology for
the next generation wireless Internet satisfying the needs of anywhere-anytime broadband …

An improved address ownership in mobile IPv6

MS Hwang, CC Lee, SK Chong - Computer communications, 2008 - Elsevier
An improved address ownership in mobile IPv6 - ScienceDirect Skip to main contentSkip to
article Elsevier logo Journals & Books Search RegisterSign in View PDF Download full issue …