Techniques are described for enabling authentication and/or key agreement
between communications network stations and service networks. The
techniques described include the negotiation and use of a cryptographic
primitive shared between a service network and a home environment of a
station. The techniques described also feature a key usage indicator,
such as a sequence number, maintained by the service network and a
station. Comparison of the key usage indicators can, for example, permit
efficient authentication of the service network.