Roaming Scenario

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 513 Experts worldwide ranked by ideXlab platform

Jianying Zhou - One of the best experts on this subject based on the ideXlab platform.

  • Time-bound anonymous authentication for Roaming networks
    IEEE Transactions on Information Forensics and Security, 2015
    Co-Authors: Joseph K. Liu, Cheng Kang Chu, Xin-yi Huang, Sherman S. M. Chow, Man Ho Au, Jianying Zhou
    Abstract:

    We propose an anonymous authentication protocol that supports time-bound credentials for an efficient revocation. It is especially suitable for large-scale network in Roaming Scenario. With our newly designed group signature scheme as a building block, a timestamp can be embedded to user secret key. No expired key can be used to authenticate, and hence naturally revoked users (e.g., due to contract expiration) are not required to be put into the revocation list. This makes our protocol much faster than previous Roaming protocols in terms of revocation checking, which is a main part in verification.

Joseph K. Liu - One of the best experts on this subject based on the ideXlab platform.

  • Time-bound anonymous authentication for Roaming networks
    IEEE Transactions on Information Forensics and Security, 2015
    Co-Authors: Joseph K. Liu, Cheng Kang Chu, Xin-yi Huang, Sherman S. M. Chow, Man Ho Au, Jianying Zhou
    Abstract:

    We propose an anonymous authentication protocol that supports time-bound credentials for an efficient revocation. It is especially suitable for large-scale network in Roaming Scenario. With our newly designed group signature scheme as a building block, a timestamp can be embedded to user secret key. No expired key can be used to authenticate, and hence naturally revoked users (e.g., due to contract expiration) are not required to be put into the revocation list. This makes our protocol much faster than previous Roaming protocols in terms of revocation checking, which is a main part in verification.

Noel Crespi - One of the best experts on this subject based on the ideXlab platform.

  • ICIN - Resolving ten MVNO issues with EPS architecture, VoLTE and advanced policy server
    2011 15th International Conference on Intelligence in Next Generation Networks, 2011
    Co-Authors: Rebecca Copeland, Noel Crespi
    Abstract:

    The numbers of MVNOs (Mobile Virtual Network Operator) are growing globally, but so do their operational and business issues. This paper identifies these issues and looks for remedies via the new 4G architecture and interfaces. The paper examines the ‘Full’ MVNO model as a ‘Home’ network in a pseudo Roaming Scenario (National Roaming), allowing MVNO to connect to multiple MNOs through the discovery and selection process, and to benefit from the access agnostic nature of EPS (Enhanced Packet System). Greater MVNO independence can resolve many of the MVNO's underlying issues, e.g. launching services and variable charging that are enabled by IMS Voice and non-Voice. Other persisting issues are solved by the MVNO defining user centric policies that are conveyed to the MNO transport network through new interfaces for the Policy & Charging Rules Function (PCRF). Particular issues can be resolved by integrating the User Data Repository (UDR) with policies and charging rules. MVNO also need to support the value chain via ‘Sponsored Data’ from service/content providers and receive Traffic Detection Function (TDF) reports on user context and behaviour. This paper argues that these features strengthen the Full MVNO position in the layered business model in EPS, and that the identified issues are substantially alleviated.

  • Resolving ten MVNO issues with EPS architecture, VoLTE and advanced policy server
    2011 15th International Conference on Intelligence in Next Generation Networks, 2011
    Co-Authors: Rebecca Copeland, Noel Crespi
    Abstract:

    The numbers of MVNOs (Mobile Virtual Network Operator) are growing globally, but so do their operational and business issues. This paper identifies these issues and looks for remedies via the new 4G architecture and interfaces. The paper examines the `Full' MVNO model as a `Home' network in a pseudo Roaming Scenario (National Roaming), allowing MVNO to connect to multiple MNOs through the discovery and selection process, and to benefit from the access agnostic nature of EPS (Enhanced Packet System). Greater MVNO independence can resolve many of the MVNO's underlying issues, e.g. launching services and variable charging that are enabled by IMS Voice and non-Voice. Other persisting issues are solved by the MVNO defining user centric policies that are conveyed to the MNO transport network through new interfaces for the Policy & Charging Rules Function (PCRF). Particular issues can be resolved by integrating the User Data Repository (UDR) with policies and charging rules. MVNO also need to support the value chain via `Sponsored Data' from service/content providers and receive Traffic Detection Function (TDF) reports on user context and behaviour. This paper argues that these features strengthen the Full MVNO position in the layered business model in EPS, and that the identified issues are substantially alleviated.

Cheng Kang Chu - One of the best experts on this subject based on the ideXlab platform.

  • Time-bound anonymous authentication for Roaming networks
    IEEE Transactions on Information Forensics and Security, 2015
    Co-Authors: Joseph K. Liu, Cheng Kang Chu, Xin-yi Huang, Sherman S. M. Chow, Man Ho Au, Jianying Zhou
    Abstract:

    We propose an anonymous authentication protocol that supports time-bound credentials for an efficient revocation. It is especially suitable for large-scale network in Roaming Scenario. With our newly designed group signature scheme as a building block, a timestamp can be embedded to user secret key. No expired key can be used to authenticate, and hence naturally revoked users (e.g., due to contract expiration) are not required to be put into the revocation list. This makes our protocol much faster than previous Roaming protocols in terms of revocation checking, which is a main part in verification.

Xin-yi Huang - One of the best experts on this subject based on the ideXlab platform.

  • Time-bound anonymous authentication for Roaming networks
    IEEE Transactions on Information Forensics and Security, 2015
    Co-Authors: Joseph K. Liu, Cheng Kang Chu, Xin-yi Huang, Sherman S. M. Chow, Man Ho Au, Jianying Zhou
    Abstract:

    We propose an anonymous authentication protocol that supports time-bound credentials for an efficient revocation. It is especially suitable for large-scale network in Roaming Scenario. With our newly designed group signature scheme as a building block, a timestamp can be embedded to user secret key. No expired key can be used to authenticate, and hence naturally revoked users (e.g., due to contract expiration) are not required to be put into the revocation list. This makes our protocol much faster than previous Roaming protocols in terms of revocation checking, which is a main part in verification.