A Study of Authentication Protocol for Mobile Networks
博士 === 淡江大學 === 資訊工程學系博士班 === 94 === In mobile communications nowadays, personal privacy and security are of top concern to mobile phone subscribers. In protecting the confidential and sensitive data in mobile networks, cryptosystem can be considered as an important technique. Yet, mainstream mobi...
Main Authors: | Feng-Fu Su, 蘇豐富 |
---|---|
Other Authors: | 黃仁俊 |
Format: | Others |
Language: | en_US |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/14397586654544342220 |
Similar Items
-
A Study on Authentication Protocols for Mobile Ad Hoc Network
by: Chia-Feng Tsai, et al.
Published: (2005) -
The Study on Authentication and Billing Protocols for the Integration of WLAN and Cellular Networks
by: Jiann-Haur Su, et al.
Published: (2004) -
Efficient End-to-End Authentication Protocols for Mobile Networks
by: Chang, Cheng-Hsin, et al.
Published: (1996) -
Mobility Management and Authentication in Mobile Communication Networks
by: Kuen-Liang Sue, et al.
Published: (2003) -
An Anonymous Authentication Protocol with Chargeability and Fair Privacy for Mobile Network Environments
by: Shi-Ming Huang, et al.
Published: (2006)