-
1
-
-
0028272762
-
Privacy and Authentication for Wireless Local Area Networks
-
A. Aziz and W. Diffie, "Privacy and Authentication for Wireless Local Area Networks", IEEE Personal Communications, Vol. 1, No. 1, pp. 25-31, 1994.
-
(1994)
IEEE Personal Communications
, vol.1
, Issue.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
2
-
-
0027641891
-
Privacy and Authentication on a Portable Communication System
-
M.J. Beller, L.F. Chang and Y. Yacobi, "Privacy and Authentication on a Portable Communication System", IEEE Journal on Selected Areas in Communications, Vol. 11, No. 6, pp. 821-829, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.6
, pp. 821-829
-
-
Beller, M.J.1
Chang, L.F.2
Yacobi, Y.3
-
4
-
-
0029359261
-
Techniques for Privacy and Authentication in Personal Communication Systems
-
D. Brown, "Techniques for Privacy and Authentication in Personal Communication Systems", IEEE Personal Communications, Vol. 2, No. 4, pp. 6-10, 1995.
-
(1995)
IEEE Personal Communications
, vol.2
, Issue.4
, pp. 6-10
-
-
Brown, D.1
-
5
-
-
0025386404
-
A Logic of Authentication
-
M. Burrows, M. Abadi and R.M. Needham, "A Logic of Authentication", ACM Transactions on Computer Systems, Vol. 8, No. 1, pp. 18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
6
-
-
0002378128
-
Optimal Privacy and Authentication on a Portable Communication System
-
U. Carlsen, "Optimal Privacy and Authentication on a Portable Communication System", Operating Systems Review, Vol. 28, No. 3, 16-23, 1994.
-
(1994)
Operating Systems Review
, vol.28
, Issue.3
, pp. 16-23
-
-
Carlsen, U.1
-
8
-
-
0029360131
-
Security Issues in a CDPD Wireless Network
-
Y. Frankel, A. Herzberg, P.A. Karger, H. Krawczyk, C.A. Kunzinger and M. Yung, "Security Issues in a CDPD Wireless Network", IEEE Personal Communications, Vol. 2, No. 4, 16-27, 1995.
-
(1995)
IEEE Personal Communications
, vol.2
, Issue.4
, pp. 16-27
-
-
Frankel, Y.1
Herzberg, A.2
Karger, P.A.3
Krawczyk, H.4
Kunzinger, C.A.5
Yung, M.6
-
9
-
-
0343023009
-
Location Management Strategies Increasing Privacy in Mobile Communication
-
IFTP
-
D. Kesdogan, H. Federrath, A. Jerichow and A. Pfitzmann, "Location Management Strategies Increasing Privacy in Mobile Communication", in Proceedings of Information Systems Security Facing the Information Society of the 21st Century, IFTP, 1996, pp. 39-48.
-
(1996)
Proceedings of Information Systems Security Facing the Information Society of the 21st Century
, pp. 39-48
-
-
Kesdogan, D.1
Federrath, H.2
Jerichow, A.3
Pfitzmann, A.4
-
14
-
-
0030261212
-
Privacy and Authentication Protocol for PCS
-
S. Mohan, "Privacy and Authentication Protocol for PCS", IEEE Personal Communications, pp. 34-38, 1996.
-
(1996)
IEEE Personal Communications
, pp. 34-38
-
-
Mohan, S.1
-
15
-
-
0028397595
-
Authentication of Mobile Users
-
R. Molva, D. Samfat and . Tsudik, "Authentication of Mobile Users", IEEE Network, Vol. 8, No. 2, pp. 26-34, 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.2
, pp. 26-34
-
-
Molva, R.1
Samfat, D.2
Tsudik3
-
16
-
-
0031210893
-
IMT-2000 Standards: Network Aspects
-
R. Pandya, D. Grillo, E. Lycksell, P. Mieybegue, H. Okinaka and M. Yabusaki, "IMT-2000 Standards: Network Aspects", IEEE Personal Communications, Vol. 4, No. 4, pp. 20-29, 1997.
-
(1997)
IEEE Personal Communications
, vol.4
, Issue.4
, pp. 20-29
-
-
Pandya, R.1
Grillo, D.2
Lycksell, E.3
Mieybegue, P.4
Okinaka, H.5
Yabusaki, M.6
-
17
-
-
0031234695
-
On Certificate-Based Security Protocols for Wireless Mobile Communication Systems
-
C.S. Park, "On Certificate-Based Security Protocols for Wireless Mobile Communication Systems", IEEE Network, pp. 50-55, 1997.
-
(1997)
IEEE Network
, pp. 50-55
-
-
Park, C.S.1
-
18
-
-
84969354234
-
On Key Distribution and Authentication in Mobile Radio Networks
-
C. Park, K. Kurosawa, T. Okamoto and S. Tsujii, "On Key Distribution and Authentication in Mobile Radio Networks", in Proceedings of Advances in Cryptology-Eurocrypt '93, 1993, pp. 461-465.
-
(1993)
Proceedings of Advances in Cryptology-eurocrypt '93
, pp. 461-465
-
-
Park, C.1
Kurosawa, K.2
Okamoto, T.3
Tsujii, S.4
-
20
-
-
0031170116
-
Weaknesses of North American Wireless Authentication Protocol
-
"Weaknesses of North American Wireless Authentication Protocol", IEEE Personal Communications, Vol. 4, No. 3, pp. 40-44, 1997.
-
(1997)
IEEE Personal Communications
, vol.4
, Issue.3
, pp. 40-44
-
-
-
23
-
-
0029482911
-
The Need for Decentralization and Privacy in Mobile Communications Networks
-
F. Stoll, "The Need for Decentralization and Privacy in Mobile Communications Networks", Computers and Security, Vol. 14, No. 6, pp. 527-539, 1995.
-
(1995)
Computers and Security
, vol.14
, Issue.6
, pp. 527-539
-
-
Stoll, F.1
-
26
-
-
0029358520
-
Privacy and Authentication Needs of PCS
-
J.E. Wilkes, "Privacy and Authentication Needs of PCS", IEEE Personal Communications, Vol. 2, No. 4, pp. 11-15, 1995.
-
(1995)
IEEE Personal Communications
, vol.2
, Issue.4
, pp. 11-15
-
-
Wilkes, J.E.1
|