An end-to-end ID-Based Encryption and Authentication Scheme for Short Message Service in GSM Networks

Faculty Computer Science Year: 2013
Type of Publication: ZU Hosted Pages: 1-15
Authors:
Journal: International Journal of Digital Content Technology and its Applications Advanced Institute of Convergence IT Volume: 7
Keywords : , end-to-end ID-Based Encryption , Authentication Scheme , Short    
Abstract:
Short Message Service (SMS) is the most common text messaging service available on handheld devices. However, there is no any form of encryption or message integrity checking on the SMS message whilst traversing the GSM backbone. Also there
   
     
 
       

Author Related Publications

  • Walid Ibrahim Ibrahim Khedr, "On the Security of Anonymous Authentication Scheme for Mobile LEO Satellite Networks", Advanced Institute of Convergence IT, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "SRFID: A hash-based security scheme for low cost RFID systems", Elsevier, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags", National Chung Hsing University, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "Enhanced inter-ASN handover authentication scheme for IEEE 802.16m network", Institution of Engineering and Technology United Kingdom, 2015 More
  • Walid Ibrahim Ibrahim Khedr, "Improved Lightweight Authentication Scheme For Ieee 802.11P Vehicle-to-Infrastructure Communications", Old City Publishing, Inc., USA, 2015 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Enhanced inter-ASN handover authentication scheme for IEEE 802.16m network", Institution of Engineering and Technology United Kingdom, 2015 More
  • Walid Ibrahim Ibrahim Khedr, "Improved Lightweight Authentication Scheme For Ieee 802.11P Vehicle-to-Infrastructure Communications", Old City Publishing, Inc., USA, 2015 More
  • Khalied Mohamed Hosny, "Comments on "Robust circularly orthogonal moment based on Chebyshev rational function", Digital Signal Processing, Vol. 62, p. 249-258, 2017.", Elsevier, 2017 More
  • Ehab Roshdy Mohamed, "Solving systems of nonlinear equations via conjugate direction flower pollination algorithm", inderscience, 2017 More
  • Ehab Roshdy Mohamed, "Krill herd algorithm based on cuckoo search for solving engineering optimization problems", # Springer Science+Business Media New York 2017, 2017 More
Tweet