메뉴 건너뛰기




Volumn 25, Issue 4, 1999, Pages 225-248

Security and authentication in PCS

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK PROTOCOLS; RADIO COMMUNICATION; SECURITY OF DATA; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 0032678890     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0045-7906(99)00010-5     Document Type: Article
Times cited : (24)

References (33)
  • 5
    • 0345498927 scopus 로고
    • Security requirements and their realization in mobile networks
    • Hagen R. Security requirements and their realization in mobile networks. Telektronikk 1992;88(3).
    • (1992) Telektronikk , vol.88 , Issue.3
    • Hagen, R.1
  • 7
    • 85031618147 scopus 로고    scopus 로고
    • EIA/TIA-IS-54-B. 1992
    • EIA/TIA-IS-54-B. 1992.
  • 8
    • 85031632366 scopus 로고    scopus 로고
    • ETSI, ETS 300 175-7. October 1992
    • ETSI, ETS 300 175-7. October 1992.
  • 10
    • 0028272762 scopus 로고
    • Privacy and authentication for wireless local area network
    • Aziz A, Diffie W. Privacy and authentication for wireless local area network. IEEE Personal Commun 1994;First Quarter:25-31,.
    • (1994) IEEE Personal Commun , vol.FIRST QUARTER , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 11
    • 0027641891 scopus 로고
    • Privacy and authentication on a portable communication system
    • Beller MJ, Cheng L, Yacobi Y. Privacy and authentication on a portable communication system. IEEE J Selected Areas Commun 1993;11(6):821-9.
    • (1993) IEEE J Selected Areas Commun , vol.11 , Issue.6 , pp. 821-829
    • Beller, M.J.1    Cheng, L.2    Yacobi, Y.3
  • 12
    • 79957632364 scopus 로고
    • Authentication protocols for personal communication systems
    • Lin HY, Harn L. Authentication protocols for personal communication systems. Comput Commun Rev 1995;25(4):256-61.
    • (1995) Comput Commun Rev , vol.25 , Issue.4 , pp. 256-261
    • Lin, H.Y.1    Harn, L.2
  • 13
    • 0028397595 scopus 로고
    • Authentication of mobile users
    • Molva R, Samfat D, Tsudik G. Authentication of mobile users. IEEE Network 1994;March/April:26-34.
    • (1994) IEEE Network , vol.MARCH-APRIL , pp. 26-34
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 14
    • 0042664779 scopus 로고
    • Authentication in distributed systems: A bibliography
    • Liebl A. Authentication in distributed systems: a bibliography. Operating Syst Rev 1994;June:31-41.
    • (1994) Operating Syst Rev , vol.JUNE , pp. 31-41
    • Liebl, A.1
  • 17
    • 84976719654 scopus 로고
    • Scalable, secure, mobile computing with location information
    • Spreitzer M, Theimer M. Scalable, secure, mobile computing with location information. Commun ACM 1993;36(7):27.
    • (1993) Commun ACM , vol.36 , Issue.7 , pp. 27
    • Spreitzer, M.1    Theimer, M.2
  • 20
    • 85065841843 scopus 로고
    • Security in mobile and cordless telecommunications
    • Walker M. Security in mobile and cordless telecommunications. In: Proceedings of CompEuro 1992, 1992. p. 493-6.
    • (1992) Proceedings of CompEuro 1992 , pp. 493-496
    • Walker, M.1
  • 24
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystem
    • Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem. Comm ACM 1978;21(12):120-6.
    • (1978) Comm ACM , vol.21 , Issue.12 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 26
    • 0019080452 scopus 로고
    • A modification of RSA public-key encryption
    • Williams V. A modification of RSA public-key encryption. IEEE Trans Informat Theory 1980:IT-26(6).
    • (1980) IEEE Trans Informat Theory , vol.IT-26 , Issue.6
    • Williams, V.1
  • 27
    • 0002378128 scopus 로고
    • Optimal Privacy and authetication on a portable communications system
    • June
    • Carlsen U. Optimal Privacy and authetication on a portable communications system. Oper Syst Rev 1994: June.
    • (1994) Oper Syst Rev
    • Carlsen, U.1
  • 29
    • 1642338135 scopus 로고    scopus 로고
    • Arbitrating disputed bills adding non-repudiation services in personal communication systems
    • Lin H, Harn H. Arbitrating disputed bills adding non-repudiation services in personal communication systems. In: Proc. Joint Conference on Information Science, 1998.
    • (1998) Proc. Joint Conference on Information Science
    • Lin, H.1    Harn, H.2
  • 32
    • 0345067391 scopus 로고
    • A software authentication system for information integrity
    • Harn L, Lin HY. A software authentication system for information integrity. Comput Security 1992;11(8):747-52.
    • (1992) Comput Security , vol.11 , Issue.8 , pp. 747-752
    • Harn, L.1    Lin, H.Y.2
  • 33
    • 0030261212 scopus 로고    scopus 로고
    • Privacy and Authentication protocols for PCS
    • Oct.
    • Mohan S. Privacy and Authentication protocols for PCS. IEEE Personal Commun 1996:34-8 (Oct.).
    • (1996) IEEE Personal Commun , pp. 34-38
    • Mohan, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.