A secure and efficient authentication scheme for mobile users Online publication date: Tue, 14-Mar-2006
by Ya-Fen Chang, Jung-San Lee, Chin-Chen Chang
International Journal of Mobile Communications (IJMC), Vol. 4, No. 5, 2006
Abstract: In 2004, Long et al. proposed a new public key certification structure to implement a localised authentication scheme by modifying the SSL protocol v3.0. Their scheme keeps the user's identity concealed and minimises the influence of the home network's failure and the overhead of having the legal user authenticated by its home network. Unfortunately, the privacy of the roaming user and the round efficiency in Long et al.'s scheme are doubted. In this paper, the authors present an improved version conserving the advantages of Long et al.'s scheme, ensuring round efficiency and providing both mutual authentication and key agreement.
Online publication date: Tue, 14-Mar-2006
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Mobile Communications (IJMC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com