Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks
Citations
163 citations
112 citations
81 citations
Cites background or methods from "Nframe: A privacy-preserving with n..."
...Note that the schemes [14], [15] TABLE 5 Comparison of Transmission Costs...
[...]
...To achieve anonymity, pseudo identities are adopted in [14], [15]....
[...]
...The scheme [14] aims to realize robustness by introducingmany other entities to distribute the ability of the AAA server based on the secret sharing technique....
[...]
...[13] No No No No – – No No No [34] No No No No – – Yes Yes No [24] No No No No – – Yes Yes No Scheme I [20] No No No No – – Yes Yes No Scheme II [20] No No No Yes Yes No Yes Yes No [15] No No No Yes Yes No No No – [14] No No No Yes Yes No Yes Yes No [25] No Yes Yes No – – Yes Yes No [35] No Yes No No – – Yes Yes No [18] No Yes No Yes Yes No No No No [17] No Yes Yes Yes Yes No Yes Yes No RUSH Yes Yes Yes Yes Yes Yes Yes Yes Yes...
[...]
...Note that both UE’s identity anonymity and UE’s traceability are realized in RUSHand schemes [14], [15], [17], [18], [20]....
[...]
70 citations
Cites methods from "Nframe: A privacy-preserving with n..."
...Five schemes [172]–[176] use the AVISPA tool [171] to verify the security of these schemes against insider attacks and outsider attacks, and to prove two privacy models, namely, identity privacy and location privacy....
[...]
43 citations
Cites background from "Nframe: A privacy-preserving with n..."
...Because those devices often store a large amount of users’ private information and affect the operation of the entire system [9]–[11]....
[...]
References
14,340 citations
4,004 citations
1,044 citations
685 citations
407 citations