The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
So far, engineers have proposed many authentication protocols to repair drawbacks of GSM system. Among them, Peinado's method can solve those and provide an anonymous channel for mobile users, an intruder therefore is unable to trace the identity and the location of the user. However, we find that authenticating VLR does not be performed at the first time when MS joins into a new visiting VLR to ask...
Increasing numbers of mobile users are being allowed to use wireless networks, and universal access is being promoted. In the absent of a single, trusted authentication server, it is a great challenge to ensure the inter-domain security, which makes it feasible for users to migrate into foreign domains. Thus, an authentication mechanism is needed between mobile users and foreign servers, and an authenticated...
Recently, a secure authentication scheme with anonymity for wireless communications has been proposed. In this paper, we demonstrate some security flaws of this scheme and propose an improvement to solve these problems.
Recently, Peyravian and Jeffries proposed an efficient password authentication scheme with key agreement, which utilizes no extra tokens and freely updates account numbers and passwords for users. Unfortunately, due to the fact that the integrity is not well protected, it is still vulnerable to the fatal weaknesses. To overcome these security flaws, we propose an enhanced version with novel architecture...
With the popularity of wireless communication, the security of mobile networks becomes more and more important. However, due to the computation limitation, many existing authentication key agreement protocols are not suitable for wireless mobile networks. In 2005, Sui et al. proposed an efficient authentication key agreement protocol, but their protocol can not resist the off-line password guessing...
Engineers have proposed lots of mechanisms for providing secure communications in ad hoc networks since the early 1990s. Due to the absence of fixed infrastructure, ad hoc networks are more vulnerable when encountering security threats than conventional wireless networks. The mobile ad hoc network can be considered as a short-lived collection of mobile nodes that communicate with each other. All involved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.