A privacy protecting UMTS AKA protocol providing perfect forward secrecy
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Daeyoung | - |
dc.contributor.author | Cui, Younggang | - |
dc.contributor.author | Kim, Sangjin | - |
dc.contributor.author | Oh, Heekuck | - |
dc.date.accessioned | 2021-06-23T20:43:32Z | - |
dc.date.available | 2021-06-23T20:43:32Z | - |
dc.date.issued | 2007-00 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/44345 | - |
dc.description.abstract | In UMTS (Universal Mobile Telecommunication System), a protocol called UMTS AKA (Authentication and Key Agreement) is used to securely authenticate an MS (Mobile Station). However, the UMTS AKA has several drawbacks such as network bandwidth consumption and synchronization problem. In this paper, we propose a new authentication protocol for UMTS that overcomes these problems. Moreover, our protocol enhances the security of the protocol by providing better privacy and also provides perfect forward secrecy. Furthermore, our protocol also provides mutual authentication between an MS and its HN (Home Network) and between an MS and the SN (Serving Network). © Springer-Verlag Berlin Heidelberg 2007. | - |
dc.format.extent | 9 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Springer Verlag | - |
dc.title | A privacy protecting UMTS AKA protocol providing perfect forward secrecy | - |
dc.type | Article | - |
dc.publisher.location | 독일 | - |
dc.identifier.doi | 10.1007/978-3-540-74477-1_88 | - |
dc.identifier.scopusid | 2-s2.0-38049178221 | - |
dc.identifier.wosid | 000250429600088 | - |
dc.identifier.bibliographicCitation | Computational Science and Its Applications - ICCSA 2007, pp 987 - 995 | - |
dc.citation.title | Computational Science and Its Applications - ICCSA 2007 | - |
dc.citation.startPage | 987 | - |
dc.citation.endPage | 995 | - |
dc.type.docType | Conference Paper | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | Authentication | - |
dc.subject.keywordPlus | Bandwidth | - |
dc.subject.keywordPlus | Data privacy | - |
dc.subject.keywordPlus | Synchronization | - |
dc.subject.keywordPlus | Network bandwidth consumption | - |
dc.subject.keywordPlus | Perfect forward secrecy | - |
dc.subject.keywordPlus | Privacy | - |
dc.subject.keywordPlus | Network protocols | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | Perfect forward secrecy | - |
dc.subject.keywordAuthor | Privacy | - |
dc.subject.keywordAuthor | UMTS | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/978-3-540-74477-1_88 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.