1999
DOI: 10.1016/s0140-3664(99)00010-9
|View full text |Cite
|
Sign up to set email alerts
|

Performance of an enhanced GSM protocol supporting non-repudiation of service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
11
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…Many authentication protocols have been proposed to solve the different drawbacks of the GSM authentication protocol. In 1999, Stach et al [20] proposed a secure method for GSM by changing the GSM architecture, which can resolve some of the drawbacks mentioned above. In 2003, Lee and Hwang [21] proposed a new protocol based secret and public cryptosystem, which has a very high cost.…”
Section: Limits Of Mobility Management and The Authentication Mechanimentioning
confidence: 99%
“…Many authentication protocols have been proposed to solve the different drawbacks of the GSM authentication protocol. In 1999, Stach et al [20] proposed a secure method for GSM by changing the GSM architecture, which can resolve some of the drawbacks mentioned above. In 2003, Lee and Hwang [21] proposed a new protocol based secret and public cryptosystem, which has a very high cost.…”
Section: Limits Of Mobility Management and The Authentication Mechanimentioning
confidence: 99%
“…1, there are at least three protocols designed for non-repudiation services of mobile transactions [11,12,21]. These protocols are intended to solve some inevitable non-repudiation problems in the GSM/3G communication between ME and Home Location Register (HLR).…”
Section: Comparisons With Stach's Tseng's and Lee's Protocolsmentioning
confidence: 99%
“…For [11,21], there is no evidence generation for dispute resolu- [12], the digital signature intended for proof of undeniably is not suitable for TTP's dispute resolution. In fact, these non-repudiation protocols are strictly for network connections (network layer) rather than message texts (application layer).…”
Section: Comparisons With Stach's Tseng's and Lee's Protocolsmentioning
confidence: 99%
See 2 more Smart Citations