An authentication protocol for mobile cellular network
Current cellular telephone system is vulnerable to various attacks. With more complicated equipments, it is possible to receive the ESN and PIN of legal user and use them to commit cellular telephone frauds. Generally, the frauds can be classified into three: subscription fraud, technical fraud, and...
| Main Authors: | Mohammed, Lawan Ahmed, Ramli, Abdul Rahman, Daud, Mohamed, Prakash, Veeraraghavan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Faculty of Computer Science and Information Technology, University of Malaya
2002
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/49477/ http://psasir.upm.edu.my/id/eprint/49477/1/An%20authentication%20protocol%20for%20mobile%20cellular%20network.pdf |
Similar Items
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Zero knowledge protocol network authentication and monitoring
by: Ang, Yong Seng
Published: (2024)
by: Ang, Yong Seng
Published: (2024)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
by: Alezabi, Kamal Ali, et al.
Published: (2020)
by: Alezabi, Kamal Ali, et al.
Published: (2020)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Improved handoff call dropping probability (HCDP) in adaptive quality of service (AdQoS) in multimedia wireless networks using hierarchical cellular approach
by: Kandasamy, Saravanan, et al.
Published: (2003)
by: Kandasamy, Saravanan, et al.
Published: (2003)
Performance Modelling for Mobile Cellular Network Using Queueing System
by: Basi, Hussein Muzahim Aziz
Published: (1999)
by: Basi, Hussein Muzahim Aziz
Published: (1999)
An efficient authentication and key agreement protocol for 4G (LTE) networks
by: Alezabi, Kamal Ali, et al.
Published: (2014)
by: Alezabi, Kamal Ali, et al.
Published: (2014)
Cellular automata based user authentication scheme using identity-bits commitment for wireless sensor network
by: Jamil, Norziana, et al.
Published: (2011)
by: Jamil, Norziana, et al.
Published: (2011)
Reversible palm vein authenticator design with quantum dot cellular automata for information security in nanocommunication network
by: Debnath, Bikash, et al.
Published: (2020)
by: Debnath, Bikash, et al.
Published: (2020)
An enhancement of authentication and energy efficient clustering protocol for wireless sensor network / Ahmed Abdulhadi Jasim
by: Ahmed Abdulhadi , Jasim
Published: (2021)
by: Ahmed Abdulhadi , Jasim
Published: (2021)
Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks
by: Al-Sanabani, Maher Ali
Published: (2008)
by: Al-Sanabani, Maher Ali
Published: (2008)
Strong Mobility Protocol For Mobile Wireless Sensor Networks
by: Muhammad, Javed
Published: (2015)
by: Muhammad, Javed
Published: (2015)
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)
by: Yousuf, Y., et al.
Published: (2008)
Multi-class bandwidth reservation scheme based on mobility prediction for handoff in multimedia wireless/mobile cellular networks.
by: Sanabani, Maher Ali, et al.
Published: (2008)
by: Sanabani, Maher Ali, et al.
Published: (2008)
Teletraffic Performance of Hierarchical Cellular Network in Different Populations of Slow Mobile Generated Traffics
by: Ali, Abdul Halim
Published: (1999)
by: Ali, Abdul Halim
Published: (1999)
Deniable authentication protocol based on factoring and discrete logarithm problems
by: Nek Abd Rahman, Normahirah, et al.
Published: (2022)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2022)
The implementation of mobile internet protocol in local area network
by: Fisal, Norsheila, et al.
Published: (2000)
by: Fisal, Norsheila, et al.
Published: (2000)
Design And Performance Analysis Of Mobile Data Networks: WLAN-Cellular Wan Interworking
by: Fredson, Alfred Phiri
Published: (2004)
by: Fredson, Alfred Phiri
Published: (2004)
Design And Performance Analysis of Mobile Data Networks: WLAN-Cellular Wan Interworking
by: Fredson, Alfred Phiri
Published: (2004)
by: Fredson, Alfred Phiri
Published: (2004)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
New call blocking probability (NCBP) in improved adaptive quality of service (AdQoS) for wireless multimedia communications using hierarchical cellular approach
by: Kandasamy, Saravanan, et al.
Published: (2003)
by: Kandasamy, Saravanan, et al.
Published: (2003)
A study of packet scheduling with mobile cellular
channel impairments
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2012)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2012)
A study of packet scheduling with mobile cellular channel impairments
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2012)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2012)
Quantitive measurements and modeling of microwave field intensity in the vicinity of cellular mobile network antennas
by: Jong, Tze Kian.
Published: (2007)
by: Jong, Tze Kian.
Published: (2007)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
Review on user authentication on mobile devices
by: Abdul Gimba, Usman, et al.
Published: (2024)
by: Abdul Gimba, Usman, et al.
Published: (2024)
Customers' perception towards cellular mobile telephone operators
by: Rahman, Muhammad Sabbir, et al.
Published: (2013)
by: Rahman, Muhammad Sabbir, et al.
Published: (2013)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
Opportunistic networks: mobility models, protocols, security, and privacy
Published: (2019)
Published: (2019)
Protocols for secure routing and transmission in mobile ad hoc network: a review
by: Mahdi Ahmed, Salwa Aqeel, et al.
Published: (2013)
by: Mahdi Ahmed, Salwa Aqeel, et al.
Published: (2013)
Enhancing The Quality Of Service In Mobile Networks Based On Nemo Basic Support Protocol
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
Improving real-time multimedia scheduling in
practical mobile cellular channels
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2016)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2016)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
Discrete simulation framework for wireless cellular networks.
by: Al-Sanabani, Maher Ali, et al.
Published: (2008)
by: Al-Sanabani, Maher Ali, et al.
Published: (2008)
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017)
by: Mohamed, Kartini
Published: (2017)
Similar Items
-
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004) -
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023) -
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021) -
Zero knowledge protocol network authentication and monitoring
by: Ang, Yong Seng
Published: (2024) -
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)