A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services.
Li-Sha HeNing ZhangLi-Rong HePublished in: SEC (2002)
Keyphrases
- end to end
- mobile users
- internet services
- internet access
- authentication protocol
- mobile services
- mobile internet
- mobile phone
- mobile networks
- mobile devices
- context aware
- mobile applications
- location based services
- smart card
- lightweight
- public key
- mobile agents
- multipath
- base station
- information sources
- secret key
- smart phones
- ad hoc networks
- mobile technologies
- service delivery
- wireless technologies
- security protocols
- cloud computing
- multi hop
- low cost
- response time
- multimedia