A Study on User Authentication for Roaming in Mobile Device


The KIPS Transactions:PartC, Vol. 15, No. 5, pp. 343-350, Oct. 2008
10.3745/KIPSTC.2008.15.5.343,   PDF Download:

Abstract

In ubiquitous environment, a user has been provided with service and mobility using various devices. The users’ network can be divided into a home network (a user belongs to the network through an authentication server) and an external network (when a user moves or external authentication server is). Users can use a mobile device or a device at an external network. In this paper, when a user has access to a service in an external network with a mobile device, there is a skim that a service is securely provided by roaming private information (encryption key etc…) and a skim which gives access to a home network using a device in an external network. If you use these skims, roaming is provided in order that you can use a secure service in an external network.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. I. Kang, C. S. Park, I. Y. Lee, "A Study on User Authentication for Roaming in Mobile Device," The KIPS Transactions:PartC, vol. 15, no. 5, pp. 343-350, 2008. DOI: 10.3745/KIPSTC.2008.15.5.343.

[ACM Style]
Seo Il Kang, Choon Sik Park, and Im Yeong Lee. 2008. A Study on User Authentication for Roaming in Mobile Device. The KIPS Transactions:PartC, 15, 5, (2008), 343-350. DOI: 10.3745/KIPSTC.2008.15.5.343.