메뉴 건너뛰기




Volumn 31, Issue 8, 1999, Pages 871-884

Untraceable mobility or how to travel incognito

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; MOBILE RADIO SYSTEMS; SECURITY OF DATA;

EID: 0033296116     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1389-1286(98)00021-8     Document Type: Article
Times cited : (40)

References (24)
  • 1
    • 84944291851 scopus 로고
    • Overview of the GSM system and protocol architecture
    • April
    • M. Rahnema, Overview of the GSM system and protocol architecture, IEEE Communications Magazine, April 1993.
    • (1993) IEEE Communications Magazine
    • Rahnema, M.1
  • 4
    • 0028397595 scopus 로고
    • Authentication of mobile users
    • Spring
    • R. Molva, D. Samfat, G. Tsudik, Authentication of mobile users, IEEE Network, Special Issue on Mobile Communications, Spring 1994.
    • (1994) IEEE Network , Issue.SPECIAL ISSUE ON MOBILE COMMUNICATIONS
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 7
    • 0343023009 scopus 로고    scopus 로고
    • Location management strategies increasing privacy in mobile communication systems
    • Chapman & Hall, London
    • D. Kesdogan, H. Federrath, A. Jerichow, A. Pfitzmann, Location management strategies increasing privacy in mobile communication systems, IFIP SEC'96, Proc. IFIP TC11, Chapman & Hall, London 1996, pp. 39-48.
    • (1996) IFIP SEC'96, Proc. IFIP TC11 , pp. 39-48
    • Kesdogan, D.1    Federrath, H.2    Jerichow, A.3    Pfitzmann, A.4
  • 8
    • 0027641891 scopus 로고
    • Privacy and authentication on a portable communications system
    • August
    • M. Beller, L. Chang, Y. Yacobi, Privacy and authentication on a portable communications system, IEEE JSAC, Special Issue on Wireless Personal Communications, August 1993.
    • (1993) IEEE JSAC , Issue.SPECIAL ISSUE ON WIRELESS PERSONAL COMMUNICATIONS
    • Beller, M.1    Chang, L.2    Yacobi, Y.3
  • 10
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum, Security without identification: transaction systems to make big brother obsolete, Communications of the ACM 28 (10) (1985) 1030-1044.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 13
    • 0003582072 scopus 로고    scopus 로고
    • Internet Draft, Work in Progress, draft-ietf-mobileip-ipv6-07.txt, November
    • C. Perkins, D. Johnson, Mobility Support in IPv6, Internet Draft, Work in Progress, draft-ietf-mobileip-ipv6-07.txt, November 1998.
    • (1998) Mobility Support in IPv6
    • Perkins, C.1    Johnson, D.2
  • 16
    • 0003629990 scopus 로고
    • FIPS 180-1 Federal Information Processing Standards Publication 180-1, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA
    • FIPS 180-1, Secure Hash Standard, Federal Information Processing Standards Publication 180-1, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, 1994.
    • (1994) Secure Hash Standard
  • 17
    • 0003508562 scopus 로고
    • FIPS 186 Federal Information Processing Standards Publication 186, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA
    • FIPS 186, Digital Signature Standard, Federal Information Processing Standards Publication 186, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, 1994.
    • (1994) Digital Signature Standard
  • 20
    • 85031572771 scopus 로고    scopus 로고
    • The Anonymizer Web Site
    • The Anonymizer Web Site, http://www.anonymizer.com.
  • 23
    • 85031570873 scopus 로고    scopus 로고
    • Iridium LLC Web Site
    • Iridium LLC Web Site, http://www.iridium.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.