메뉴 건너뛰기




Volumn 16, Issue 1, 2001, Pages 35-50

Authentication of mobile users in third generation mobile systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS; MOBILE COMPUTING; NETWORK PROTOCOLS; SECURITY OF DATA; USER INTERFACES;

EID: 0035135698     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1026530706019     Document Type: Article
Times cited : (27)

References (27)
  • 1
    • 0028272762 scopus 로고
    • Privacy and Authentication for Wireless Local Area Networks
    • A. Aziz and W. Diffie, "Privacy and Authentication for Wireless Local Area Networks", IEEE Personal Communications, Vol. 1, No. 1, pp. 25-31, 1994.
    • (1994) IEEE Personal Communications , vol.1 , Issue.1 , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 4
    • 0029359261 scopus 로고
    • Techniques for Privacy and Authentication in Personal Communication Systems
    • D. Brown, "Techniques for Privacy and Authentication in Personal Communication Systems", IEEE Personal Communications, Vol. 2, No. 4, pp. 6-10, 1995.
    • (1995) IEEE Personal Communications , vol.2 , Issue.4 , pp. 6-10
    • Brown, D.1
  • 6
    • 0002378128 scopus 로고
    • Optimal Privacy and Authentication on a Portable Communication System
    • U. Carlsen, "Optimal Privacy and Authentication on a Portable Communication System", Operating Systems Review, Vol. 28, No. 3, 16-23, 1994.
    • (1994) Operating Systems Review , vol.28 , Issue.3 , pp. 16-23
    • Carlsen, U.1
  • 14
    • 0030261212 scopus 로고    scopus 로고
    • Privacy and Authentication Protocol for PCS
    • S. Mohan, "Privacy and Authentication Protocol for PCS", IEEE Personal Communications, pp. 34-38, 1996.
    • (1996) IEEE Personal Communications , pp. 34-38
    • Mohan, S.1
  • 15
    • 0028397595 scopus 로고
    • Authentication of Mobile Users
    • R. Molva, D. Samfat and . Tsudik, "Authentication of Mobile Users", IEEE Network, Vol. 8, No. 2, pp. 26-34, 1994.
    • (1994) IEEE Network , vol.8 , Issue.2 , pp. 26-34
    • Molva, R.1    Samfat, D.2    Tsudik3
  • 17
    • 0031234695 scopus 로고    scopus 로고
    • On Certificate-Based Security Protocols for Wireless Mobile Communication Systems
    • C.S. Park, "On Certificate-Based Security Protocols for Wireless Mobile Communication Systems", IEEE Network, pp. 50-55, 1997.
    • (1997) IEEE Network , pp. 50-55
    • Park, C.S.1
  • 20
    • 0031170116 scopus 로고    scopus 로고
    • Weaknesses of North American Wireless Authentication Protocol
    • "Weaknesses of North American Wireless Authentication Protocol", IEEE Personal Communications, Vol. 4, No. 3, pp. 40-44, 1997.
    • (1997) IEEE Personal Communications , vol.4 , Issue.3 , pp. 40-44
  • 23
    • 0029482911 scopus 로고
    • The Need for Decentralization and Privacy in Mobile Communications Networks
    • F. Stoll, "The Need for Decentralization and Privacy in Mobile Communications Networks", Computers and Security, Vol. 14, No. 6, pp. 527-539, 1995.
    • (1995) Computers and Security , vol.14 , Issue.6 , pp. 527-539
    • Stoll, F.1
  • 26
    • 0029358520 scopus 로고
    • Privacy and Authentication Needs of PCS
    • J.E. Wilkes, "Privacy and Authentication Needs of PCS", IEEE Personal Communications, Vol. 2, No. 4, pp. 11-15, 1995.
    • (1995) IEEE Personal Communications , vol.2 , Issue.4 , pp. 11-15
    • Wilkes, J.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.