1st IEE International Conference On: Commercialising Technology and Innovation 2005
DOI: 10.1049/ic:20050605
|View full text |Cite
|
Sign up to set email alerts
|

Extending cellular authentication as a service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…Laitinen et al [1] describes the many desirable advantages offered by GAA to the end users: they do not have to create and remember new credentials every time they sing up to a new service, and they can avoid the management of several credentials to different services. They can also easily change UE they are using by, for example, switching the SIM card from a cellular phone to another.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Laitinen et al [1] describes the many desirable advantages offered by GAA to the end users: they do not have to create and remember new credentials every time they sing up to a new service, and they can avoid the management of several credentials to different services. They can also easily change UE they are using by, for example, switching the SIM card from a cellular phone to another.…”
Section: Resultsmentioning
confidence: 99%
“…The existence of several credentials is a problem not only because it is inconvenient for the user to manage them, but also because provisioning these credentials to the users is expensive for the operators and other service providers, and it requires effort from the users as well. [1] For example, a third-party WWW-based service provider might send credentials via e-mail to the user and ask him to change the password as soon as possible. This, of course, is not very secure, and requires the user to choose a good password and also to remember it.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…"Data Mining Models as a Service (E)" (2000), Sarawagi and Nagaralu [77] proposed it to cover Document Classification service, Collaborative Filtering Service, and Risk Prediction service. "Authentication as a Service (E)" (2005), Laitinen et al [57] leveraged authentication from a communication infrastructure to a service provision in Cellular Network. Similarly Lakshminarayanan et al [58] proposed "Routing as a Service (E)" (2006) to leverage specialized route computation as a service.…”
Section: Network Servicesmentioning
confidence: 99%
“…The CA is used to establish trust in the network and each mobile device stores its own public key certificate, signed by the CA. Each mobile device user A has a cellular account, which uniquely identifies it during its operation [1,15]. We denote the unique identifier of A with Id(A).…”
Section: System Modelmentioning
confidence: 99%