Authentication of mobile users in third generation mobile systems

Zhi Jia Tzeng, Wen-Guey Tzeng

研究成果: Article同行評審

25 引文 斯高帕斯(Scopus)


The goal of the third-generation mobile systems is to provide worldwide operation, enhance service capabilities, and improve performance over the second-generation mobile systems. In this paper, we propose an authentication procedure for third-generation mobile systems. The authentication procedure is a protocol suite consisting of two subprotocols: a certificate-based authentication (CBA) protocol and a ticket-based authentication (TBA) protocol. Only two parties, MS and VLR, are involved in executing our protocol. Our authentication procedure uses both public- and secret-key cryptosystems. Our authentication procedure not only provides uniform authentication across domains, but also reduces computational costs in the process of repeated authentication. We provide firm proof of our procedure's correctness.

頁(從 - 到)35-50
期刊Wireless Personal Communications
出版狀態Published - 1 一月 2001

指紋 深入研究「Authentication of mobile users in third generation mobile systems」主題。共同形成了獨特的指紋。