The computers are connected with each other by the network as a result of the progress of technology in the field of the computer and network, and then all of the data to be processed are transferred quickly and at the real-time through the computer network. However the user can use the computer system at any time, the user must go to the location of the computer system to use the computer resources. The necessities for using the computer system occur anywhere and anytime in spite of the location of the computer system. For this requirement the mobile computing environment (MCE) is expected strongly. In this paper we introduce the model of MCE and discuss the need of the user authentication at entering and logging-in the network in MCE only with a user ID. We propose the method of a user ID assignment from which a server ID can be decided by a simple logical operation. Also, we propose a protocol for a user authentication in MCE and discuss the robustness of security against the various attacking on the route.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Akio TAKUBO, Mutsumi ISHIKAWA, Takashi WATANABE, Masakazu SOGA, Tadanori MIZUNO, "User Authentication in Mobile Computing Environment" in IEICE TRANSACTIONS on Fundamentals,
vol. E80-A, no. 7, pp. 1288-1298, July 1997, doi: .
Abstract: The computers are connected with each other by the network as a result of the progress of technology in the field of the computer and network, and then all of the data to be processed are transferred quickly and at the real-time through the computer network. However the user can use the computer system at any time, the user must go to the location of the computer system to use the computer resources. The necessities for using the computer system occur anywhere and anytime in spite of the location of the computer system. For this requirement the mobile computing environment (MCE) is expected strongly. In this paper we introduce the model of MCE and discuss the need of the user authentication at entering and logging-in the network in MCE only with a user ID. We propose the method of a user ID assignment from which a server ID can be decided by a simple logical operation. Also, we propose a protocol for a user authentication in MCE and discuss the robustness of security against the various attacking on the route.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1587/e80-a_7_1288/_p
Copy
@ARTICLE{e80-a_7_1288,
author={Akio TAKUBO, Mutsumi ISHIKAWA, Takashi WATANABE, Masakazu SOGA, Tadanori MIZUNO, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={User Authentication in Mobile Computing Environment},
year={1997},
volume={E80-A},
number={7},
pages={1288-1298},
abstract={The computers are connected with each other by the network as a result of the progress of technology in the field of the computer and network, and then all of the data to be processed are transferred quickly and at the real-time through the computer network. However the user can use the computer system at any time, the user must go to the location of the computer system to use the computer resources. The necessities for using the computer system occur anywhere and anytime in spite of the location of the computer system. For this requirement the mobile computing environment (MCE) is expected strongly. In this paper we introduce the model of MCE and discuss the need of the user authentication at entering and logging-in the network in MCE only with a user ID. We propose the method of a user ID assignment from which a server ID can be decided by a simple logical operation. Also, we propose a protocol for a user authentication in MCE and discuss the robustness of security against the various attacking on the route.},
keywords={},
doi={},
ISSN={},
month={July},}
Copy
TY - JOUR
TI - User Authentication in Mobile Computing Environment
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1288
EP - 1298
AU - Akio TAKUBO
AU - Mutsumi ISHIKAWA
AU - Takashi WATANABE
AU - Masakazu SOGA
AU - Tadanori MIZUNO
PY - 1997
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E80-A
IS - 7
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - July 1997
AB - The computers are connected with each other by the network as a result of the progress of technology in the field of the computer and network, and then all of the data to be processed are transferred quickly and at the real-time through the computer network. However the user can use the computer system at any time, the user must go to the location of the computer system to use the computer resources. The necessities for using the computer system occur anywhere and anytime in spite of the location of the computer system. For this requirement the mobile computing environment (MCE) is expected strongly. In this paper we introduce the model of MCE and discuss the need of the user authentication at entering and logging-in the network in MCE only with a user ID. We propose the method of a user ID assignment from which a server ID can be decided by a simple logical operation. Also, we propose a protocol for a user authentication in MCE and discuss the robustness of security against the various attacking on the route.
ER -