Secure and efficient public key management in next generation mobile networks

Cited 8 time in webofscience Cited 0 time in scopus
  • Hit : 353
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorHan, Kyusukko
dc.contributor.authorMun, Hyeranko
dc.contributor.authorShon, Taeshikko
dc.contributor.authorYeun, Chan Yeobko
dc.contributor.authorPark, James J. (Jong Hyuk)ko
dc.date.accessioned2013-03-12T17:11:53Z-
dc.date.available2013-03-12T17:11:53Z-
dc.date.created2012-09-28-
dc.date.created2012-09-28-
dc.date.issued2012-08-
dc.identifier.citationPERSONAL AND UBIQUITOUS COMPUTING, v.16, no.6, pp.677 - 685-
dc.identifier.issn1617-4909-
dc.identifier.urihttp://hdl.handle.net/10203/102964-
dc.description.abstractEmploying public key-based security architecture is inevitable for the advanced security applications in the mobile networks. However, key storage management problems have arisen, because the public key computation is still the large overhead to USIM, and the mobile equipment has potential threats of the key leakage or loss. In order to solve such shortcomings, we improve the key-insulated models and propose "Trust Delegation" model that the overall security computations are operated in ME, while the initial private key still remains in the secure storage in USIM. Our model is resilient against not only key exposure but also key loss. Finally, we show that the overall transactions can be reduced to one-third than current 3GPP Generic Authentication Architecture.-
dc.languageEnglish-
dc.publisherSPRINGER LONDON LTD-
dc.titleSecure and efficient public key management in next generation mobile networks-
dc.typeArticle-
dc.identifier.wosid000306826800008-
dc.identifier.scopusid2-s2.0-84864585253-
dc.type.rimsART-
dc.citation.volume16-
dc.citation.issue6-
dc.citation.beginningpage677-
dc.citation.endingpage685-
dc.citation.publicationnamePERSONAL AND UBIQUITOUS COMPUTING-
dc.identifier.doi10.1007/s00779-011-0434-9-
dc.contributor.nonIdAuthorMun, Hyeran-
dc.contributor.nonIdAuthorShon, Taeshik-
dc.contributor.nonIdAuthorYeun, Chan Yeob-
dc.contributor.nonIdAuthorPark, James J. (Jong Hyuk)-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorMobile network-
dc.subject.keywordAuthorSecurity architecture-
dc.subject.keywordAuthorID-based cryptosystem-
dc.subject.keywordAuthorGeneric authentication architecture-
dc.subject.keywordAuthor3GPP-
Appears in Collection
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 8 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0