The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security of heterogeneous wireless network is the research hotspot now. Aiming at the security problems of access authentication for heterogeneous wireless network, an access authentication scheme based on CPK technology is presented. The access authentication model is based on CPK technology to realize identity authentication, temporary authentication identity is introduced to protect user privacy...
The focus of this paper is on access security aspects of 3G-WLAN interworking. Firstly, the authentication entities which do not rely on the concrete heterogeneous network are abstracted by analyzing 3G-WLAN multi-kind heterogeneous network model. And then a common authentication model is established and a novel access authentication and key agreement scheme combined elliptic curve cryptographic techniques...
In this paper, the security of user domain including mobile terminal (MT) and user in heterogeneous wireless networks (HWN) are paid more attention. We introduce the trusted platform module (TPM) to ensure the terminal trustworthiness, while password, fingerprint and smartcard guarantee userpsilas identity. MT, user, and smartcard have been regarded as three separated entities, as well as the user...
Identity authentication and key agreement are two critical security issues for the heterogeneous networks (HWN). It is likely that public key based authentication will be used due to their intrinsic advantages over symmetric key protocols. in this paper considering security and efficiency problems in HWN, a novel mutual authentication and key agreement scheme based on ECC-based CPK and ECC is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.