-
5
-
-
0345498927
-
Security requirements and their realization in mobile networks
-
Hagen R. Security requirements and their realization in mobile networks. Telektronikk 1992;88(3).
-
(1992)
Telektronikk
, vol.88
, Issue.3
-
-
Hagen, R.1
-
7
-
-
85031618147
-
-
EIA/TIA-IS-54-B. 1992
-
EIA/TIA-IS-54-B. 1992.
-
-
-
-
8
-
-
85031632366
-
-
ETSI, ETS 300 175-7. October 1992
-
ETSI, ETS 300 175-7. October 1992.
-
-
-
-
10
-
-
0028272762
-
Privacy and authentication for wireless local area network
-
Aziz A, Diffie W. Privacy and authentication for wireless local area network. IEEE Personal Commun 1994;First Quarter:25-31,.
-
(1994)
IEEE Personal Commun
, vol.FIRST QUARTER
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
11
-
-
0027641891
-
Privacy and authentication on a portable communication system
-
Beller MJ, Cheng L, Yacobi Y. Privacy and authentication on a portable communication system. IEEE J Selected Areas Commun 1993;11(6):821-9.
-
(1993)
IEEE J Selected Areas Commun
, vol.11
, Issue.6
, pp. 821-829
-
-
Beller, M.J.1
Cheng, L.2
Yacobi, Y.3
-
12
-
-
79957632364
-
Authentication protocols for personal communication systems
-
Lin HY, Harn L. Authentication protocols for personal communication systems. Comput Commun Rev 1995;25(4):256-61.
-
(1995)
Comput Commun Rev
, vol.25
, Issue.4
, pp. 256-261
-
-
Lin, H.Y.1
Harn, L.2
-
13
-
-
0028397595
-
Authentication of mobile users
-
Molva R, Samfat D, Tsudik G. Authentication of mobile users. IEEE Network 1994;March/April:26-34.
-
(1994)
IEEE Network
, vol.MARCH-APRIL
, pp. 26-34
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
14
-
-
0042664779
-
Authentication in distributed systems: A bibliography
-
Liebl A. Authentication in distributed systems: a bibliography. Operating Syst Rev 1994;June:31-41.
-
(1994)
Operating Syst Rev
, vol.JUNE
, pp. 31-41
-
-
Liebl, A.1
-
17
-
-
84976719654
-
Scalable, secure, mobile computing with location information
-
Spreitzer M, Theimer M. Scalable, secure, mobile computing with location information. Commun ACM 1993;36(7):27.
-
(1993)
Commun ACM
, vol.36
, Issue.7
, pp. 27
-
-
Spreitzer, M.1
Theimer, M.2
-
20
-
-
85065841843
-
Security in mobile and cordless telecommunications
-
Walker M. Security in mobile and cordless telecommunications. In: Proceedings of CompEuro 1992, 1992. p. 493-6.
-
(1992)
Proceedings of CompEuro 1992
, pp. 493-496
-
-
Walker, M.1
-
22
-
-
0029360131
-
Security issues in a CDPD wireless network
-
Aug.
-
Frankel Y, Herzberz A, Karger PA, Krawczyk H, Kunzinger C, Young M. Security issues in a CDPD wireless network. IEEE Personal Commun 1995:16-27 (Aug.).
-
(1995)
IEEE Personal Commun
, pp. 16-27
-
-
Frankel, Y.1
Herzberz, A.2
Karger, P.A.3
Krawczyk, H.4
Kunzinger, C.5
Young, M.6
-
24
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem. Comm ACM 1978;21(12):120-6.
-
(1978)
Comm ACM
, vol.21
, Issue.12
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
26
-
-
0019080452
-
A modification of RSA public-key encryption
-
Williams V. A modification of RSA public-key encryption. IEEE Trans Informat Theory 1980:IT-26(6).
-
(1980)
IEEE Trans Informat Theory
, vol.IT-26
, Issue.6
-
-
Williams, V.1
-
27
-
-
0002378128
-
Optimal Privacy and authetication on a portable communications system
-
June
-
Carlsen U. Optimal Privacy and authetication on a portable communications system. Oper Syst Rev 1994: June.
-
(1994)
Oper Syst Rev
-
-
Carlsen, U.1
-
29
-
-
1642338135
-
Arbitrating disputed bills adding non-repudiation services in personal communication systems
-
Lin H, Harn H. Arbitrating disputed bills adding non-repudiation services in personal communication systems. In: Proc. Joint Conference on Information Science, 1998.
-
(1998)
Proc. Joint Conference on Information Science
-
-
Lin, H.1
Harn, H.2
-
32
-
-
0345067391
-
A software authentication system for information integrity
-
Harn L, Lin HY. A software authentication system for information integrity. Comput Security 1992;11(8):747-52.
-
(1992)
Comput Security
, vol.11
, Issue.8
, pp. 747-752
-
-
Harn, L.1
Lin, H.Y.2
-
33
-
-
0030261212
-
Privacy and Authentication protocols for PCS
-
Oct.
-
Mohan S. Privacy and Authentication protocols for PCS. IEEE Personal Commun 1996:34-8 (Oct.).
-
(1996)
IEEE Personal Commun
, pp. 34-38
-
-
Mohan, S.1
|