A new privacy and authentication protocol for end-to-end mobile users.
Cheng-Chi LeeChao-Chen YangMin-Shiang HwangPublished in: Int. J. Commun. Syst. (2003)
Keyphrases
- end to end
- authentication protocol
- mobile users
- smart card
- mobile phone
- location privacy
- rfid systems
- lightweight
- security analysis
- mobile devices
- context aware
- public key
- location based services
- mobile networks
- mobile applications
- security protocols
- base station
- information sources
- high bandwidth
- mobile agents
- mobile services
- multipath
- ad hoc networks
- congestion control
- rfid tags
- secret key
- real time
- wifi
- hash functions
- multimedia services
- mobility management