![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication
As great progress has been made in mobile communications, many related researches on this topic have been proposed. In most of the proposed protocols so far, it has been assumed that the person using the mobil...
-
Article
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment
Instead of the traditional credit card payment system, we propose a new electronic payment system for use in a mobile environment. The idea behind this payment service is that a user (customer) applies a messa...
-
Article
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System
How to reduce location updating traffic is a critical issue for tracking the current locations of users in a personal communication system. Traditional location management approaches usually bring about networ...
-
Article
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs
The third generation partner project (3GPP) has standardized general packet radio service (GPRS) and the universal mobile telecommunications system (UMTS) to provide cell phone communications and wireless Inte...
-
Article
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users
The electronic transactions on wireless mobile networks, which are also called mobile commerce, become more and more popular in recent years. In mobile commerce, the electronic payment is the most important co...
-
Article
Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication
Communication network has grown to the stage where it becomes ubiquitous. It allows us to access to on-line services at anytime, anywhere and by any devices. This brings out new services, that was previous onl...
-
Article
A New Ultralightweight RFID Protocol for Low-Cost Tags: R \(^{2}\) AP
Several ultralightweight radio frequency identification (RFID) authentication protocols have been proposed in recent years. However, all of these protocols are reported later that they are vulnerable to variou...
-
Article
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
Currently, wireless sensor networks are a novel technology industry with various applications. The nodes deployed in such an environment are uncontrolled by anyone. Therefore, any security flaws can threaten f...
-
Article
An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation
Online access has been widely adopted to distribute diversified services to customers. In this architecture, public channels are utilized to exchange information between end users and remote servers at anytime...
-
Article
Security Issues in Ultralightweight RFID Authentication Protocols
Ultralightweight RFID authentication protocols have attracted much attention from both fields of science and industry in recent years due to their high efficiencies and extensive applicab...
-
Article
Untraceable biometric-based three-party authenticated key exchange for dynamic systems
An authenticated key exchange (AKE) between two end-users is a crucial procedure to ensure data integrity and confidentiality while they communicate through a public channel. The existing three-party AKE schem...
-
Article
A Biometric-Based Authenticated Key Agreement Protocol for User-to-User Communications in Mobile Satellite Networks
Satellite systems have been integrating into worldwide networks to improve the quality of services, including mobility, reliability, and coverage. Such systems offer tremendous advantages to end users at any t...
-
Article
Public auditing of log integrity for shared cloud storage systems via blockchain
Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track ...
-
Article
Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain
Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track ...