Authentication of mobile users
- 1 March 1994
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Network
- Vol. 8 (2), 26-34
- https://doi.org/10.1109/65.272938
Abstract
The goal of the paper is to propose a general approach for the authentication of users in remote domains while maintaining strict separation of security domains. The article begins with a discussion of security issues specific to user mobility, with identification of authentication requirements. Authentication solutions in existing mobile-user environments are summarized, the authors' solution to authentication of mobile users is presented, then some variations on the theme are introduced.Keywords
This publication has 12 references indexed in Scilit:
- Cascaded authenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Overview of the GSM system and protocol architectureIEEE Communications Magazine, 1993
- Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key ManagementPublished by RFC Editor ,1993
- Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication ProceduresPublished by RFC Editor ,1993
- Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and IdentifiersPublished by RFC Editor ,1993
- KryptoKnight authentication and key distribution systemLecture Notes in Computer Science, 1992
- Security without identification: transaction systems to make big brother obsoleteCommunications of the ACM, 1985
- Internet ProtocolPublished by RFC Editor ,1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976