“…So far, many of the current researches pay their attention on how to provide a secure, robust, efficient security scheme to the existing confidentiality protocol [1,3,6,8,9,10,16,17,18,20,21,22] † . However, none of them achieves the † Since the UMTS is the descendant of GSM, we consider that many of these protocols can be inherited by the UMTS.…”