完整後設資料紀錄
DC 欄位語言
dc.contributor.authorTzeng, ZJen_US
dc.contributor.authorTzeng, WGen_US
dc.date.accessioned2014-12-08T15:44:22Z-
dc.date.available2014-12-08T15:44:22Z-
dc.date.issued2001-01-01en_US
dc.identifier.issn0929-6212en_US
dc.identifier.urihttp://dx.doi.org/10.1023/A:1026530706019en_US
dc.identifier.urihttp://hdl.handle.net/11536/29972-
dc.description.abstractThe goal of the third-generation mobile systems is to provide worldwide operation, enhance service capabilities, and improve performance over the second-generation mobile systems. In this paper, we propose an authentication procedure for third-generation mobile systems. The authentication procedure is a protocol suite consisting of two subprotocols: a certificate-based authentication (CBA) protocol and a ticket-based authentication (TBA) protocol. Only two parties, MS and VLR, are involved in executing our protocol. Our authentication procedure uses both public- and secret-key cryptosystems. Our authentication procedure not only provides uniform authentication across domains, but also reduces computational costs in the process of repeated authentication. We provide firm proof of our procedure's correctness.en_US
dc.language.isoen_USen_US
dc.subjectIMT-2000en_US
dc.subjectthird-generation mobile systemsen_US
dc.subjectGSMen_US
dc.subjectauthentication protocolen_US
dc.subjectmobile computingen_US
dc.titleAuthentication of mobile users in third generation mobile systemsen_US
dc.typeArticleen_US
dc.identifier.doi10.1023/A:1026530706019en_US
dc.identifier.journalWIRELESS PERSONAL COMMUNICATIONSen_US
dc.citation.volume16en_US
dc.citation.issue1en_US
dc.citation.spage35en_US
dc.citation.epage50en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000166693300003-
dc.citation.woscount13-
顯示於類別:期刊論文


文件中的檔案:

  1. 000166693300003.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。