End-to-End User Identity Confidentiality for UMTS networks (original) (raw)

Enhanced Identity Privacy in UMTS

Hiten Choudhury

International Journal of Ad Hoc and Ubiquitous Computing, 2016

View PDFchevron_right

Enhancing end-users privacy in 3G networks

Christos Xenakis

2003

View PDFchevron_right

Achieving Better Privacy for the 3GPP AKA Protocol

Pierre-alain Fouque

Proceedings on Privacy Enhancing Technologies, 2016

View PDFchevron_right

Privacy of User Identities in Cellular Networks

mohsin khan

Helsingin yliopisto, 2021

View PDFchevron_right

Applying New Trust Requirements in 3GPP Mobile Systems for Improved Subscriber Identity Privacy

IJSRP Journal

View PDFchevron_right

Protecting IMSI and User Privacy in 5G Networks

Mats Näslund

Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

View PDFchevron_right

Anonymity and Untraceability in Mobile Networks

Refik Molva

1995

View PDFchevron_right

Security in future mobile networks

Chris Mitchell

1997

View PDFchevron_right

SPUR: A secured protocol for UMTS registration

manel abdelkader

e-Business and Telecommunication Networks

View PDFchevron_right

IDENTITY-BASED CRYPTOGRAPHY FOR SECURE MOBILE COMMUNICATION

TJPRC Publication

TJPRC, 2014

View PDFchevron_right

Anonymous Communications In Wireless Access Networks

Alisdair McDiarmid

2006

View PDFchevron_right

Anonymous authentication and location privacy preserving schemes for LTE-A networks

Sanaa Mohamed Ahmed Taha

Egyptian Informatics Journal, 2017

View PDFchevron_right

Achieving User Privacy In Mobile Networks

Bob Askwith

proceedings of the 13th …, 1997

View PDFchevron_right

Secure-AKA: An Efficient AKA Protocol for UMTS Networks

Neetesh Saxena

Wireless Personal Communications, 2014

View PDFchevron_right

PA-AKA: Privacy-Aware and Lightweight Authentication Scheme for Long Term Evolution (LTE)

Adedamola Dada

Communications on Applied Electronics, 2019

View PDFchevron_right

PRIVATE AND ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS

George C Polyzos

2008

View PDFchevron_right

Subscriber Privacy in Cellular Systems

Geir Køien

View PDFchevron_right

A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks

zhiguo wan

2008

View PDFchevron_right

Current Approaches to Authentication in Wireless and Mobile Communications Networks

Holger Karl

View PDFchevron_right

AUTHENTICATION AND KEY AGREEMENT IN 3GPP NETWORKS

Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP)

View PDFchevron_right

A Secure Mobile VPN Scheme for UMTS

Nikos Loukas, Christos Xenakis

2006

View PDFchevron_right

Untraceability in Mobile Networks

Dr. Didier Samfat

1995

View PDFchevron_right

Analysis of Security and Privacy in Mobile IP

Andreas Fasbender

1996

View PDFchevron_right

Mutual entity authentication for LTE

Geir Køien

2011 7th International Wireless Communications and Mobile Computing Conference, 2011

View PDFchevron_right

Defeating the Downgrade Attack on Identity Privacy in 5G

Philip Ginzboorg

Security Standardisation Research, 2018

View PDFchevron_right

Identity Confidentiality in 5G Mobile Telephony Systems

Haibat Khan

Lecture Notes in Computer Science, 2018

View PDFchevron_right

A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks

Samiran Chattopadhyay

Wireless Personal Communications

View PDFchevron_right

Identity management in mobile cellular networks and related applications

Kai Rannenberg

Information Security Technical Report, 2004

View PDFchevron_right

ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks

Neetesh Saxena

View PDFchevron_right

Secure universal mobility for wireless Internet

Henning G. Schulzrinne

ACM SIGMOBILE Mobile Computing and Communications Review, 2005

View PDFchevron_right

Private Authentication Techniques for the Global Mobility Network

Chi-Chao Chang

Wireless Personal Communications, 2005

View PDFchevron_right

Privacy enhanced cellular access security

Geir Køien

Proceedings of the 4th ACM workshop on Wireless security - WiSe '05, 2005

View PDFchevron_right

3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA

Kyusuk Han

2009 Wireless Telecommunications Symposium, 2009

View PDFchevron_right