JOURNAL ARTICLE

End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication

Chin‐Chen ChangKuo-Lun ChenMin‐Shiang Hwang

Year: 2004 Journal:   Wireless Personal Communications Vol: 28 (2)Pages: 95-106   Publisher: Springer Science+Business Media
Keywords:
Computer science Password Subscriber identity module Computer security Session (web analytics) Session key Authentication protocol Mobile identification number Authentication (law) Challenge-Handshake Authentication Protocol Multi-factor authentication Protocol (science) Key (lock) Computer network Mobile computing World Wide Web Telecommunications Mobile technology Mobile Web Encryption

Metrics

10
Cited By
3.16
FWCI (Field Weighted Citation Impact)
15
Refs
0.92
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

BOOK-CHAPTER

Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications

Reiner DojenVladimir PaşcaTom Coffey

Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Year: 2009 Pages: 278-287
JOURNAL ARTICLE

End-to-end communications security

Kevin J. Kumpf

Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Year: 2006 Vol: 6241 Pages: 62410R-62410R
JOURNAL ARTICLE

A new privacy and authentication protocol for end‐to‐end mobile users

Cheng‐Chi LeeChao‐Chen YangMin‐Shiang Hwang

Journal:   International Journal of Communication Systems Year: 2003 Vol: 16 (9)Pages: 799-808
© 2026 ScienceGate Book Chapters — All rights reserved.