Full metadata record
DC poleHodnotaJazyk
dc.contributor.authorDostálek, Libor
dc.contributor.authorŠafařík, Jiří
dc.contributor.editorPinker, Jiří
dc.date.accessioned2019-10-15T09:11:51Z
dc.date.available2019-10-15T09:11:51Z
dc.date.issued2017
dc.identifier.citation2017 International Conference on Applied Electronics: Pilsen, 5th – 6th September 2017, Czech Republic, p.49-54.en
dc.identifier.isbn978–80–261–0641–8 (Print)
dc.identifier.isbn978–80–261–0642–5 (Online)
dc.identifier.issn1803–7232 (Print)
dc.identifier.issn1805–9597 (Online)
dc.identifier.urihttp://hdl.handle.net/11025/35407
dc.format6 s.cs
dc.format.mimetypeapplication/pdf
dc.language.isoenen
dc.publisherZápadočeská univerzita v Plznics
dc.rights© Západočeská univerzita v Plznics
dc.subjectautentizacecs
dc.subjectAKAcs
dc.subjectmobilní aplikacecs
dc.subjectIMScs
dc.subjectrobustní dvoufaktorové ověřovánícs
dc.subjectmobilní autentizacecs
dc.titleStrong password authentication with AKA authentication mechanismen
dc.typekonferenční příspěvekcs
dc.typeconferenceObjecten
dc.rights.accessopenAccessen
dc.type.versionpublishedVersionen
dc.description.abstract-translatedThis contribution discusses algorithms for strong authentication of applications in mobile devices. The current LTE and IMS networks provide strong authentication using USIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole control of Telco operators. We can expect that more applications will be placed into the IMS environment in the future. These applications will be based either on SIP (video on demand etc.) or HTTP-based protocols (e.g. as government applications or banking applications etc.). They will be provided not only by Telco operators, but also especially by independent third parties - application (content) providers (e.g. government, banks etc.). This contribution proposes new authentication algorithms that combine AKA algorithm with other authentication algorithms. Therefore, the authentication is not under the sole control of Telco operators, still using strong authentication AKA protocol.en
dc.subject.translatedauthenticationen
dc.subject.translatedAKAen
dc.subject.translatedmobile applicationen
dc.subject.translatedIMSen
dc.subject.translatedrobust two-factor authenticationen
dc.subject.translatedmobile authenticationen
dc.type.statusPeer-revieweden
Vyskytuje se v kolekcích:Applied Electronics 2017
Applied Electronics 2017

Soubory připojené k záznamu:
Soubor Popis VelikostFormát 
Dostalek.pdfPlný text1,1 MBAdobe PDFZobrazit/otevřít


Použijte tento identifikátor k citaci nebo jako odkaz na tento záznam: http://hdl.handle.net/11025/35407

Všechny záznamy v DSpace jsou chráněny autorskými právy, všechna práva vyhrazena.