On the design of security protocols for mobile communications

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

25 Citations (Scopus)


Use of mobile personal computers in open networked environment is revolutionalising the way we use computer. Mobile networked computing is raising important information security and privacy issues. This paper is concerned with the design of authentication protocols for a mobile computing environment. The paper first analyses the authentication initiator protocols proposed by Belier, Chang and Yacobi (BCY) and the modifications considered by Carlsen and points out some weaknesses. The paper then suggests improvements to these protocols. The paper proposes secure end-to-end protocols between mobile users using both symmetric and public key based systems. These protocols enable mutual authentication and establish a shared secret key between mobile users. Furthermore, these protocols provide a certain degree of anonymity of the communicating users to be achieved vis-a-vis other system users.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 1st Australasian Conference, ACISP 1996, Proceedings
Place of PublicationBerlin; Heidelberg
PublisherSpringer, Springer Nature
Number of pages12
ISBN (Print)3540619917, 9783540619918
Publication statusPublished - 1996
Externally publishedYes
Event1st Australasian Conference on Information Security and Privacy, ACISP - 1996 - Wollongong, Australia
Duration: 24 Jun 199626 Jun 1996

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)03029743
ISSN (Electronic)16113349


Other1st Australasian Conference on Information Security and Privacy, ACISP - 1996

Fingerprint Dive into the research topics of 'On the design of security protocols for mobile communications'. Together they form a unique fingerprint.

Cite this