Cryptanalysis of an optimized protocol for mobile network authentication and security.
Chi-Sung LaihShin Yan ChiouPublished in: Inf. Process. Lett. (2003)
Keyphrases
- mobile networks
- authentication protocol
- secret key
- key agreement
- mutual authentication
- key agreement protocol
- key distribution
- security analysis
- ban logic
- virtual private network
- security protocols
- hash functions
- security services
- smart card
- security requirements
- user authentication
- cryptographic protocols
- security properties
- mobile users
- key management
- security mechanisms
- mobile nodes
- wireless networks
- public key
- signature scheme
- mobile devices
- ad hoc networks
- rfid tags
- trust negotiation
- base station
- ip networks
- diffie hellman
- trusted third party
- information security
- elliptic curve
- security issues
- key exchange protocol
- cellular networks
- provably secure
- access control
- multimedia content
- mobile ad hoc networks
- network security
- routing problem
- context aware
- real time