Use of mobile personal computers in open networked environment is revolutionalising the way we use computers. Mobile networked computing is raising some important information security and privacy issues. This paper is concerned with the design of authentication protocols for a mobile networked computing environment. We propose mobile user authentication protocols in intra and inter domain situations using symmetric key based cryptosystems. The paper then extends these protocols to an end-to-end situation, thereby allowing two mobile users to have secure conversations. The protocols provide varying degrees of anonymity of the communicating users to other system users. 1 Introduction Information and communication technology is on the threshold of new style of computing . First, the telecommunications industry is witnessing the development of Personal Communication Systems that are "person-specific" with person to person logical connections. Such systems rely more and more on wireles..
To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.