D Fang, Y Qian, RQ Hu - IEEE access, 2017 - ieeexplore.ieee.org
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive study on the security of …
After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the …
User authentication is an important security mechanism for recognizing legal roaming users. In 2006, Lee, Hwang, and Liao proposed an enhanced authentication scheme with user …
F Wu, L Xu, S Kumari, X Li, AK Das… - Security and …, 2016 - Wiley Online Library
Ubiquitous networks support the roaming service for mobile communication devices. The mobile user can use the services in the foreign network with the help of the home network …
User authentication is an important security mechanism for recognizing legal roaming users. The emerging global mobility network, however, has called for new requirements for …
The development of the fifth generation (5G) wireless networks is gaining momentum to connect almost all aspects of life through the network with much higher speed, very low …
HJ Jo, JH Paik, DH Lee - IEEE Transactions on Mobile …, 2013 - ieeexplore.ieee.org
Secure authentication in roaming services is being designed to allow legal users to get access to wireless network services when they are away from their home location. Recently …
D He, N Kumar, MK Khan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
As a mechanism to secure access to a global mobility network (GLOMONET), authentication for consumer roaming service is an essential technology. Moreover, as mobile consumers …
D Zhao, H Peng, L Li, Y Yang - Wireless Personal Communications, 2014 - Springer
Recently, Mun et al. analyzed Wu et al.'s authentication scheme and proposed an enhanced anonymous authentication scheme for roaming service in global mobility networks …