A strong user authentication protocol for GSM
Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE
150 - 153
MetadataShow full item record
Please cite this item using this persistent URLhttp://hdl.handle.net/11693/27349
Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings certain limitations and restrictions on the functionality of the system. In this paper we propose a user authentication protocol for the Global Standards for Mobile (GSM) which permits the use of weak secrets (e.g. passwords or PINs) for authentication, providing new flexibilities for the GSM users. © 2005 IEEE.
Showing items related by title, author, creator and subject.
Yan P.; Gao, Y.; Özbay H. (2005)It has been shown that the transmission control protocol (TCP) connections through the congested routers can be modeled as a feedback dynamic system. In this paper we design a variable structure (VS) based control scheme ...
Akar, N.; Hokelek I.; Atik, M.; Karasan, E. (Institute of Electrical and Electronics Engineers Inc., 2003)We propose a novel traffic engineering architecture for IP networks with multiprotocol label switching (MPLS) backbones. In this architecture, two (primary and secondary) label switched paths (LSPs) are established among ...
Zhang, Y.; Rangnekar, A.; Selcuk, A.A.; Bicak, A.; Sidhu, D. (IEEE Computer Society, 2003)With the current trend toward ubiquitous computing come wireless devices capable of forming the nodes of mobile ad hoc networks. Such networks typically rely on routing protocols in order to communicate messages from a ...