- Full text PDF available (3)
- This year (0)
- Last five years (2)
In UMTS mobile networks, there are some circumstances that the International Mobile Subscriber Identity (IMSI) of a user is conveyed in clear-text over the radio interface. Such situations violate the anonymity of users. In this paper, we introduce an improved user identity confidentiality (IUIC) mechanism which attempts to avoid the drawback and makes… (More)
In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart cards. Later, Yang and Wang pointed out that Wu and Chieu's scheme is vulnerable to the password guessing and forgery attacks. Recently, Lee et al. proposed an improved authentication scheme and claimed that their scheme is secure against forgery attack. However, in this… (More)
This article describes how to use BibTeX package for creating bibliographies for L A T E X documents. It also describes bibliography database entry formats and standard styles available on BibTeX.