國立臺灣大學電機工程學系Chang, Cheng-HsinCheng-HsinChangTu, KweiKweiTuChen, Kwang-ChengKwang-ChengChen2006-09-272018-07-062006-09-272018-07-061996http://ntur.lib.ntu.edu.tw//handle/246246/20060927122747992203For conventional authentication protocols, distribution of session keys and maintenance of large databases are serious problems especially for large-scale wireless networks. ID-based authentication protocol eliminates the problem while it contributes the heavy computation load. We propose a hybrid end-to-end authentication and key agreement (AKA) protocol which provides authentication and key exchange between both end entities. It not only eliminates the drawbacks of conventional protocols but also reduces the computation load. Services of message confidentiality, caller ID confidentiality, service request intractability, and fraud control are provided. Roaming and handover, are also taken into consideration here.application/pdf518313 bytesapplication/pdfzh-TWEfficient End-to-End Authentication Protocols for Mobile Networksthesishttp://ntur.lib.ntu.edu.tw/bitstream/246246/20060927122747992203/1/1996-75.pdf