A review of information security issues and respective research contributions

MT Siponen, H Oinas-Kukkonen - ACM SIGMIS Database: the …, 2007 - dl.acm.org
This paper identifies four security issues (access to Information Systems, secure
communication, security management, development of secure Information Systems), and …

Fault-tolerant and scalable key management for smart grid

D Wu, C Zhou - IEEE Transactions on Smart Grid, 2011 - ieeexplore.ieee.org
In this paper, we study the problem of secure key management for smart grid. Since existing
key management schemes are not suitable for deployment in smart grid, in this paper, we …

Method for managing access to protected computer resources

RL Gregg, S Giri, TC Goeke - US Patent 9,413,768, 2016 - Google Patents
(57) ABSTRACT A system for securing and tracking usage of transaction Ser vices or
computer resources by a client computer from a first server computer, which includes …

Security analysis and enhancements of 3GPP authentication and key agreement protocol

M Zhang, Y Fang - IEEE Transactions on wireless …, 2005 - ieeexplore.ieee.org
This paper analyzes the authentication and key agreement protocol adopted by Universal
Mobile Telecommunication System (UMTS), an emerging standard for third-generation (3G) …

[图书][B] RSA and public-key cryptography

RA Mollin - 2002 - taylorfrancis.com
Although much literature exists on the subject of RSA and public-key cryptography, until now
there has been no single source that reveals recent developments in the area at an …

Private authentication

M Abadi, C Fournet - Theoretical Computer Science, 2004 - Elsevier
Frequently, communication between two principals reveals their identities and presence to
third parties. These privacy breaches can occur even if security protocols are in use; indeed …

An efficient mobile authentication scheme for wireless networks

C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
This paper proposes an efficient authentication scheme, which is suitable for low-power
mobile devices. It uses an elliptic-curve-eryptosystem based trust delegation mechanism to …

[PDF][PDF] Untraceability in mobile networks

D Samfat, R Molva, N Asokan - … of the 1st annual international conference …, 1995 - dl.acm.org
User mobility is a feature that raises many new security-related issues and concerns. One of
them is the disclosure of a mobile user's reai identity during the authentication process, or …

Authentication process including setting up a secure channel between a subscriber and a service provider accessible through a telecommunications operator

MJP Wary - US Patent 6,745,326, 2004 - Google Patents
US6745326B1 - Authentication process including setting up a secure channel between a
subscriber and a service provider accessible through a telecommunications operator …

Wireless network security and interworking

M Shin, J Ma, A Mishra, WA Arbaugh - Proceedings of the IEEE, 2006 - ieeexplore.ieee.org
A variety of wireless technologies have been standardized and commercialized, but no
single technology is considered the best because of different coverage and bandwidth …