Authentication and payment in future mobile systems
G Horn, B Preneel - Computer Security—ESORICS 98: 5th European …, 1998 - Springer
This article presents an efficient public-key protocol for mutual authentication and key
exchange designed for third generation mobile communications systems. The paper also …
exchange designed for third generation mobile communications systems. The paper also …
Revocation of cryptographic digital certificates
CB Gentry, ZA Ramzan, B Bruhn - US Patent 8,024,562, 2011 - Google Patents
H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure
communications; Network security protocols including means for verifying the identity or …
communications; Network security protocols including means for verifying the identity or …
Authentication protocols for mobile network environment value-added services
G Horn, KM Martin, CJ Mitchell - IEEE Transactions on …, 2002 - ieeexplore.ieee.org
The secure provision of mobile computing and telecommunication services is rapidly
increasing in importance as both demand and applications for such services continue to …
increasing in importance as both demand and applications for such services continue to …
Identity-based anonymous remote authentication for value-added services in mobile networks
X Cao, X Zeng, W Kou, L Hu - IEEE Transactions on Vehicular …, 2009 - ieeexplore.ieee.org
Based on identity-based cryptography, this paper proposes a remote authentication protocol
featured with client anonymity, nonrepudiation, and improved efficiency for value-added …
featured with client anonymity, nonrepudiation, and improved efficiency for value-added …
A secure authentication and billing architecture for wireless mesh networks
Wireless mesh networks (WMNs) are gaining growing interest as a promising technology for
ubiquitous high-speed network access. While much effort has been made to address issues …
ubiquitous high-speed network access. While much effort has been made to address issues …
An Identity‐Based Anonymous Three‐Party Authenticated Protocol for IoT Infrastructure
The rapid advancement in the field of wireless sensor and cellular networks have
established a rigid foundation for the Internet of Things (IoT). IoT has become a novel …
established a rigid foundation for the Internet of Things (IoT). IoT has become a novel …
Multi-certificate revocation using encrypted proof data for proving certificate's validity or invalidity
ZA Ramzan, CB Gentry, B Bruhn - US Patent 7,315,941, 2008 - Google Patents
(57) ABSTRACT A certification authority (CA, 120) generates decryption key data (K) for
each set (F) in the complement cover (804) for a plurality of digital certificates. The CA …
each set (F) in the complement cover (804) for a plurality of digital certificates. The CA …
Authentication and payment in future mobile systems
G Horn, B Preneel - Journal of Computer Security, 2000 - content.iospress.com
This article presents an efficient public-key protocol for mutual authentication and key
exchange designed for future mobile communications systems. The paper also …
exchange designed for future mobile communications systems. The paper also …
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks
Roaming services in wireless networks provide people with preferable flexibility and
convenience. However, such advantages should be offered with both security and privacy in …
convenience. However, such advantages should be offered with both security and privacy in …
Revocation of cryptographic digital certificates
CB Gentry, ZA Ramzan, B Bruhn - US Patent 7,814,314, 2010 - Google Patents
Different targets (co, N) of a digital certificate are mapped into a “super-target” using
methods allowing a certificate validity verifier (110) to compute the super-target. The cer …
methods allowing a certificate validity verifier (110) to compute the super-target. The cer …