Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/215530.215548acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article
Free access

Untraceability in mobile networks

Published: 01 December 1995 Publication History
First page of PDF

References

[1]
M. Rahnema, Ooervielu of the GSM System and Protocol Architr:cture, IEEE Communications Magazine, April 1993.]]
[2]
J. Steiner, C. Neuman, J. Schiller, Kerberos: An Authentication Service for Open Network Systems, Proceedings of USENIX Winter Conference, February 1988.]]
[3]
R. Molva, G. Tsudik, E. Van Herreweghen, S. Zatti, KryptoKnight Authentication and Key Distribution System, Proceedings of ES- ORICS'92, November 1902.]]
[4]
R. Rivest, The MD5 Message Digest Algorithm, Internet DRAFT, July 1991.]]
[5]
R. Molva, D. Samfat, G. Tsudik, Authentication of Mob& Users, IEEE Network Magazine, Special Issue on Mobile Communications, March/April 1994.]]
[6]
W. Diffie and M. IIellrnan, New Directions in Cryptogruphy, IEEE Transactions on Information Theory, November 1976.]]
[7]
National Bureau of Standards, &&rnl Injormulion Processing Standards, National Bureau of Standards, Publication 46, 1977.]]
[8]
Cellular Digital Packet Dutu (CDPD) System Specification, Release 1.0, July 19, 1993.]]
[9]
European Telecommunications Standards Institute, Universul Personul Telecommlrrricutirns, ETSI NA7 WPl, November 1992.]]
[10]
D. Chaum, A. Fiat and M. Naor, Untruceuble Electronic Cash, Proceedings of Crypto'88, August 1988.]]
[11]
D. Chaum, Security Withont Identification: Trunsactions Systems to Make Big Brother Obsolete, CACM Vol. 28, No. 10, October 1985.]]
[12]
RSA Data Security Inc., The RC4 Encryption Algorithm, Document No. 003-013005-100-000- 000, March 12, 1992.]]
[13]
M J.Beller, L F. Chang, Y. Yacobi Security for Personal Commnnicutions Services: Pnblic-Key vs. Private Key Approaches Proceedings of 2nd International Symposium on Personal, Indoor and Mobile Radio Communications, October 1992.]]
[14]
W. Diffie, P.C. van Oorschot., M.J. Wiener Anthenticutaon and Anthenticuted Key Ezchunges in Designs, Codes and Cryptogruphy Kluwer Academic Publishers, July 1!)92.]]
[15]
A. Herzberg, H. Krawczyk, G. Tsudik On Traveling Incognito Proceedings of First IEEE Workshop on Mobile Computing and its Applications, December 1994.]]
[16]
Michael Burrows et al., A Logic of Anthenticution, Digital Systems Research Center, Technical Report 39, February, 1990, May, 1994.]]

Cited By

View all
  • (2023)DC-IIoT: A Secure and Efficient Authentication Protocol for Industrial Internet-of-Things Based on Distributed Control PlaneInternet of Things10.1016/j.iot.2023.10078222(100782)Online publication date: Jul-2023
  • (2022)SDIWSN: A Software-Defined Networking-Based Authentication Protocol for Real-Time Data Transfer in Industrial Wireless Sensor NetworksIEEE Transactions on Network and Service Management10.1109/TNSM.2022.317397519:3(3465-3477)Online publication date: Sep-2022
  • (2022)An anonymity-preserving mobile user authentication protocol for global roaming servicesComputer Networks10.1016/j.comnet.2022.109532(109532)Online publication date: Dec-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiCom '95: Proceedings of the 1st annual international conference on Mobile computing and networking
December 1995
236 pages
ISBN:0897918142
DOI:10.1145/215530
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 1995

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CDPD
  2. GSM
  3. alias
  4. anonymity
  5. authentication
  6. location privacy
  7. mobility
  8. security

Qualifiers

  • Article

Conference

MobiCom95

Acceptance Rates

MobiCom '95 Paper Acceptance Rate 20 of 79 submissions, 25%;
Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)116
  • Downloads (Last 6 weeks)17
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2023)DC-IIoT: A Secure and Efficient Authentication Protocol for Industrial Internet-of-Things Based on Distributed Control PlaneInternet of Things10.1016/j.iot.2023.10078222(100782)Online publication date: Jul-2023
  • (2022)SDIWSN: A Software-Defined Networking-Based Authentication Protocol for Real-Time Data Transfer in Industrial Wireless Sensor NetworksIEEE Transactions on Network and Service Management10.1109/TNSM.2022.317397519:3(3465-3477)Online publication date: Sep-2022
  • (2022)An anonymity-preserving mobile user authentication protocol for global roaming servicesComputer Networks10.1016/j.comnet.2022.109532(109532)Online publication date: Dec-2022
  • (2022)A secure and efficient authentication protocol for wireless applications in multi-server environmentPeer-to-Peer Networking and Applications10.1007/s12083-022-01323-615:4(1939-1952)Online publication date: 11-May-2022
  • (2022)Secure and Authentic Anonymous Roaming ServiceWireless Personal Communications10.1007/s11277-022-09579-0125:1(819-839)Online publication date: 21-Feb-2022
  • (2022)Enhancing the Elliptic Curve Integrated Encryption Scheme in 5G mobile network for home network identity privacySECURITY AND PRIVACY10.1002/spy2.2225:4Online publication date: 7-Mar-2022
  • (2021)On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility NetworksIEEE Access10.1109/ACCESS.2021.30504029(12879-12895)Online publication date: 2021
  • (2021)Secure and efficient authentication protocol with user untraceability for global roaming servicesWireless Networks10.1007/s11276-021-02800-1Online publication date: 7-Oct-2021
  • (2021)A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environmentThe Journal of Supercomputing10.1007/s11227-021-04114-778:4(5903-5930)Online publication date: 7-Oct-2021
  • (2021)UntraceabilityEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-642-27739-9_1759-1(1-3)Online publication date: 14-Dec-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media