A Secure Authentication Policy for UMTS and WLAN Interworking.
Yen-Chieh OuyangChang-Bu JangHung-Ta ChenPublished in: ICC (2007)
Keyphrases
- wireless local area network
- user authentication
- authentication scheme
- authentication mechanism
- identity management
- security architecture
- security mechanisms
- data encryption
- password authentication
- security analysis
- authentication protocol
- integrity verification
- security requirements
- key distribution
- factor authentication
- wireless networks
- public key cryptography
- access control policies
- heterogeneous networks
- cellular networks
- secure manner
- optimal policy
- smart card
- rights management
- access control
- quality of service
- security services
- security model
- secure communication
- public key infrastructure
- encryption decryption
- base station
- access points
- key management
- public key
- electronic payment
- trust negotiation
- security policies
- security issues
- key agreement
- sensitive data
- mutual authentication
- data security
- wifi
- key exchange protocol
- digital signature
- resource constrained
- biometric authentication
- private key
- security properties
- cloud computing