-
5
-
-
84958780603
-
-
Science, vol. 1485, pp. 277-293, 1998.
-
G. Horn and B. Preenel, Authentication and payment in future mobile systems, Computer Security-ESORI CS '98, Lecture Notes in Computer Science, vol. 1485, pp. 277-293, 1998.
-
And B. Preenel, Authentication and Payment in Future Mobile Systems, Computer Security-ESORI CS '98, Lecture Notes in Computer
-
-
Horn, G.1
-
6
-
-
22044447040
-
-
1998.
-
K.M. Martin, B. Preenel, C. J. Mitchell, H. J. Hitz, G. Horn, A. Poliakova, and P. Howard, Secure billing for mobile information services in UMTS, IS&N, LNCS 1430, pp. 535-548, Springer-Verlag, May 1998.
-
B. Preenel, C. J. Mitchell, H. J. Hitz, G. Horn, A. Poliakova, and P. Howard, Secure Billing for Mobile Information Services in UMTS, IS&N, LNCS 1430, Pp. 535-548, Springer-Verlag, May
-
-
Martin, K.M.1
-
7
-
-
0017018484
-
-
Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
-
And M. Hellman, "New Directions in Cryptography," IEEE
-
-
Diffie, W.1
-
8
-
-
84874800178
-
-
Trans. Inf. Theory, vol. IT-31, no. 4, pp. 469-472, 1985.
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol. IT-31, no. 4, pp. 469-472, 1985.
-
"A Public Key Cryptosystem and A Signature Scheme Based on Discrete Logarithms," IEEE
-
-
Elgamal, T.1
-
9
-
-
0017930809
-
-
cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key
-
-
Rivest, R.1
-
12
-
-
84944878354
-
-
Press, 1997.
-
A.J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
-
P. C. Van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC
-
-
Menezes, A.J.1
-
13
-
-
0028466586
-
-
1994.
-
R. Rueppel and P. van Oorschot, "Modern key agreement techniques," Computer Commun. , vol. 17, no. 7, pp. 452-465, July 1994.
-
And P. Van Oorschot, "Modern Key Agreement Techniques," Computer Commun. , Vol. 17, No. 7, Pp. 452-465, July
-
-
Rueppel, R.1
-
14
-
-
84969340391
-
-
Cryptology-Crypto'89, pp. 324-333, Springer-Verlag, 1990.
-
M. Tatebayashi, N. Matsuzaki, and D. B. Ncwman, Jr. , "Key distribution protocol for digital mobile communications systems," Advances in Cryptology-Crypto'89, pp. 324-333, Springer-Verlag, 1990.
-
N. Matsuzaki, and D. B. Ncwman, Jr. , "Key Distribution Protocol for Digital Mobile Communications Systems," Advances in
-
-
Tatebayashi, M.1
-
15
-
-
0028272762
-
-
Q, pp. 25-31, 1994.
-
A. Aziz and W. Diffie, "Privacy and authentication for wireless local area networks," IEEE Personal Communications, 1st Q, pp. 25-31, 1994.
-
And W. Diffie, "Privacy and Authentication for Wireless Local Area Networks," IEEE Personal Communications, 1st
-
-
Aziz, A.1
-
21
-
-
84979022024
-
-
Protocols, LNCS, vol. 1189, pp. 139-153, 1997.
-
L. Chen, D. Gollmann, and C. J. Mitchell, "Key escrow in mutually mistrusting domains," Cambridge Workshop on Security Protocols, LNCS, vol. 1189, pp. 139-153, 1997.
-
D. Gollmann, and C. J. Mitchell, "Key Escrow in Mutually Mistrusting Domains," Cambridge Workshop on Security
-
-
Chen, L.1
-
22
-
-
21944452447
-
-
Coding, LNCS, vol. 1355, pp. 221-232, 1997.
-
K.M. Martin, "Increasing efficiency of international key escrow in mutually mistrusting domains," 6th IMA Conference on Cryptography and Coding, LNCS, vol. 1355, pp. 221-232, 1997.
-
"Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains," 6th IMA Conference on Cryptography and
-
-
Martin, K.M.1
|