Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A privacy protecting UMTS AKA protocol providing perfect forward secrecy

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Daeyoung-
dc.contributor.authorCui, Younggang-
dc.contributor.authorKim, Sangjin-
dc.contributor.authorOh, Heekuck-
dc.date.accessioned2021-06-23T20:43:32Z-
dc.date.available2021-06-23T20:43:32Z-
dc.date.issued2007-00-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/44345-
dc.description.abstractIn UMTS (Universal Mobile Telecommunication System), a protocol called UMTS AKA (Authentication and Key Agreement) is used to securely authenticate an MS (Mobile Station). However, the UMTS AKA has several drawbacks such as network bandwidth consumption and synchronization problem. In this paper, we propose a new authentication protocol for UMTS that overcomes these problems. Moreover, our protocol enhances the security of the protocol by providing better privacy and also provides perfect forward secrecy. Furthermore, our protocol also provides mutual authentication between an MS and its HN (Home Network) and between an MS and the SN (Serving Network). © Springer-Verlag Berlin Heidelberg 2007.-
dc.format.extent9-
dc.language영어-
dc.language.isoENG-
dc.publisherSpringer Verlag-
dc.titleA privacy protecting UMTS AKA protocol providing perfect forward secrecy-
dc.typeArticle-
dc.publisher.location독일-
dc.identifier.doi10.1007/978-3-540-74477-1_88-
dc.identifier.scopusid2-s2.0-38049178221-
dc.identifier.wosid000250429600088-
dc.identifier.bibliographicCitationComputational Science and Its Applications - ICCSA 2007, pp 987 - 995-
dc.citation.titleComputational Science and Its Applications - ICCSA 2007-
dc.citation.startPage987-
dc.citation.endPage995-
dc.type.docTypeConference Paper-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusAuthentication-
dc.subject.keywordPlusBandwidth-
dc.subject.keywordPlusData privacy-
dc.subject.keywordPlusSynchronization-
dc.subject.keywordPlusNetwork bandwidth consumption-
dc.subject.keywordPlusPerfect forward secrecy-
dc.subject.keywordPlusPrivacy-
dc.subject.keywordPlusNetwork protocols-
dc.subject.keywordAuthorAuthentication-
dc.subject.keywordAuthorPerfect forward secrecy-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorUMTS-
dc.identifier.urlhttps://link.springer.com/chapter/10.1007/978-3-540-74477-1_88-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Oh, Hee kuck photo

Oh, Hee kuck
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE