Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Authentication of mobile users

Published: 01 March 1994 Publication History

Abstract

The goal of the paper is to propose a general approach for the authentication of users in remote domains while maintaining strict separation of security domains. The article begins with a discussion of security issues specific to user mobility, with identification of authentication requirements. Authentication solutions in existing mobile-user environments are summarized, the authors' solution to authentication of mobile users is presented, then some variations on the theme are introduced

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Network: The Magazine of Global Internetworking
IEEE Network: The Magazine of Global Internetworking  Volume 8, Issue 2
March 1994
46 pages

Publisher

IEEE Press

Publication History

Published: 01 March 1994

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2015)Authentication in Ubiquitous NetworkingInternational Journal of Information Security and Privacy10.4018/IJISP.20150701049:3(57-83)Online publication date: 1-Jul-2015
  • (2011)An efficient authentication protocol for mobile communicationsTelecommunications Systems10.1007/s11235-009-9276-446:1(31-41)Online publication date: 1-Jan-2011
  • (2010)An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networksIEEE Transactions on Wireless Communications10.1109/TWC.2010.092410.0900229:11(3346-3353)Online publication date: 1-Nov-2010
  • (2010)Secure three-party key distribution protocol for fast network access in EAP-based wireless networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2010.04.01454:15(2651-2673)Online publication date: 1-Oct-2010
  • (2010)A kerberized architecture for fast re-authentication in heterogeneous wireless networksMobile Networks and Applications10.1007/s11036-009-0220-315:3(392-412)Online publication date: 1-Jun-2010
  • (2009)Authenticated wireless roaming via tunnelsProceedings of the 4th International Symposium on Information, Computer, and Communications Security10.1145/1533057.1533072(92-103)Online publication date: 10-Mar-2009
  • (2007)A review of information security issues and respective research contributionsACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/1216218.121622438:1(60-80)Online publication date: 28-Feb-2007
  • (2006)TMSI allocation mechanism using a secure VLR authorization in the GSM systemProceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications10.1007/11872153_15(171-181)Online publication date: 20-Sep-2006
  • (2006)SUALPPA schemeProceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV10.1007/11751632_95(883-892)Online publication date: 8-May-2006
  • (2005)ANSWERProceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks10.1145/1089761.1089776(88-95)Online publication date: 13-Oct-2005
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media