Authentication and payment in future mobile systems

G Horn, B Preneel - Computer Security—ESORICS 98: 5th European …, 1998 - Springer
This article presents an efficient public-key protocol for mutual authentication and key
exchange designed for third generation mobile communications systems. The paper also …

Revocation of cryptographic digital certificates

CB Gentry, ZA Ramzan, B Bruhn - US Patent 8,024,562, 2011 - Google Patents
H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure
communications; Network security protocols including means for verifying the identity or …

Authentication protocols for mobile network environment value-added services

G Horn, KM Martin, CJ Mitchell - IEEE Transactions on …, 2002 - ieeexplore.ieee.org
The secure provision of mobile computing and telecommunication services is rapidly
increasing in importance as both demand and applications for such services continue to …

Identity-based anonymous remote authentication for value-added services in mobile networks

X Cao, X Zeng, W Kou, L Hu - IEEE Transactions on Vehicular …, 2009 - ieeexplore.ieee.org
Based on identity-based cryptography, this paper proposes a remote authentication protocol
featured with client anonymity, nonrepudiation, and improved efficiency for value-added …

A secure authentication and billing architecture for wireless mesh networks

Y Zhang, Y Fang - Wireless Networks, 2007 - Springer
Wireless mesh networks (WMNs) are gaining growing interest as a promising technology for
ubiquitous high-speed network access. While much effort has been made to address issues …

An Identity‐Based Anonymous Three‐Party Authenticated Protocol for IoT Infrastructure

A Shafiq, MF Ayub, K Mahmood, M Sadiq… - Journal of …, 2020 - Wiley Online Library
The rapid advancement in the field of wireless sensor and cellular networks have
established a rigid foundation for the Internet of Things (IoT). IoT has become a novel …

Multi-certificate revocation using encrypted proof data for proving certificate's validity or invalidity

ZA Ramzan, CB Gentry, B Bruhn - US Patent 7,315,941, 2008 - Google Patents
(57) ABSTRACT A certification authority (CA, 120) generates decryption key data (K) for
each set (F) in the complement cover (804) for a plurality of digital certificates. The CA …

Authentication and payment in future mobile systems

G Horn, B Preneel - Journal of Computer Security, 2000 - content.iospress.com
This article presents an efficient public-key protocol for mutual authentication and key
exchange designed for future mobile communications systems. The paper also …

A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks

Z Wan, K Ren, B Preneel - Proceedings of the first ACM conference on …, 2008 - dl.acm.org
Roaming services in wireless networks provide people with preferable flexibility and
convenience. However, such advantages should be offered with both security and privacy in …

Revocation of cryptographic digital certificates

CB Gentry, ZA Ramzan, B Bruhn - US Patent 7,814,314, 2010 - Google Patents
Different targets (co, N) of a digital certificate are mapped into a “super-target” using
methods allowing a certificate validity verifier (110) to compute the super-target. The cer …