메뉴 건너뛰기




Volumn 53, Issue 10, 2004, Pages 1317-1329

Anonymous wireless authentication on a portable cellular mobile system

Author keywords

Anonymity; Authentication; Group communications; Identity based cryptosystem; Security

Indexed keywords

CONFERENCE CALLS; CRYPTOGRAPHY; DATA PRIVACY; MICROCONTROLLERS; SECURITY OF DATA; THEOREM PROVING; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 11944251256     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2004.70     Document Type: Article
Times cited : (18)

References (37)
  • 1
    • 0028016794 scopus 로고
    • "Overview of GSM: Philosophy and Results"
    • T. Haug, "Overview of GSM: Philosophy and Results," Int'l J. Wireless Information Networks, vol. 1, pp. 7-16, 1994.
    • (1994) Int'l J. Wireless Information Networks , vol.1 , pp. 7-16
    • Haug, T.1
  • 2
    • 11944275147 scopus 로고
    • "T1P1.3/93-044RI, Draft Technical Report on Privacy and Authentication Objectives for Wireless Access to Personal Communications"
    • May
    • "T1P1.3/93-044RI, Draft Technical Report on Privacy and Authentication Objectives for Wireless Access to Personal Communications," pp. 9-11, May 1993.
    • (1993) , pp. 9-11
  • 4
    • 0027678720 scopus 로고
    • "Scheme for Secure Digital Communication Based on Symmetric Key Cryptography"
    • T. Hwang, "Scheme for Secure Digital Communication Based on Symmetric Key Cryptography," Information Processing Letters, vol. 48, pp. 35-37, 1993.
    • (1993) Information Processing Letters , vol.48 , pp. 35-37
    • Hwang, T.1
  • 6
    • 0027641891 scopus 로고
    • "Privacy and Authentication on a Portable Communications System"
    • Aug
    • M.J. Belier, L.F. Chang, and Y. Yacobi, "Privacy and Authentication on a Portable Communications System," IEEE J. Selected Areas. in Comm. vol. 11, pp. 821-829, Aug. 1993.
    • (1993) IEEE J. Selected Areas. in Comm. , vol.11 , pp. 821-829
    • Belier, M.J.1    Chang, L.F.2    Yacobi, Y.3
  • 7
    • 0028272762 scopus 로고
    • "Privacy and Authentication for Wireless Local Area Networks"
    • First Quarter
    • A. Ashar and W. Diffie, "Privacy and Authentication for Wireless Local Area Networks," IEEE Personal Comm., pp. 25-31, First Quarter 1994.
    • (1994) IEEE Personal Comm. , pp. 25-31
    • Ashar, A.1    Diffie, W.2
  • 8
    • 0027813901 scopus 로고
    • "Authentication in Wireless Communications"
    • H.Y. Lin and L. Harn, "Authentication in Wireless Communications," Proc. IEEE Global Com '93, pp. 550-554, 1993.
    • (1993) Proc. IEEE Global Com '93 , pp. 550-554
    • Lin, H.Y.1    Harn, L.2
  • 9
    • 0028397595 scopus 로고
    • "Authentication of Mobile Users"
    • Mar./Apr
    • R. Molva, D. Samfat, and G. Tsudik, "Authentication of Mobile Users," IEEE Network, pp. 26-34, Mar./Apr. 1994.
    • (1994) IEEE Network , pp. 26-34
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 10
    • 0029256120 scopus 로고
    • "Conference Key Distribution Protocols for Digital Mobile Communication Systems"
    • M.S. Hwang and W.P. Yang, "Conference Key Distribution Protocols for Digital Mobile Communication Systems," IEEE J. Selected Areas in Comm., vol. 13, no. 2, pp. 416-420, 1995.
    • (1995) IEEE J. Selected Areas in Comm. , vol.13 , Issue.2 , pp. 416-420
    • Hwang, M.S.1    Yang, W.P.2
  • 11
    • 0012841060 scopus 로고    scopus 로고
    • "A Conference Distribution System for the Start Configuration Based on the Discrete Logarithm Problem"
    • S. Hirose and K. Ikeda, "A Conference Distribution System for the Start Configuration Based on the Discrete Logarithm Problem," Information Processing Letters, Vol. 62, no. 4, pp. 189-192, 1997.
    • (1997) Information Processing Letters , vol.62 , Issue.4 , pp. 189-192
    • Hirose, S.1    Ikeda, K.2
  • 12
    • 0033343111 scopus 로고    scopus 로고
    • "Dynamic Participation in a Secure Conference Scheme for Mobile Communications"
    • Sept
    • M.S. Hwang, "Dynamic Participation in a Secure Conference Scheme for Mobile Communications," IEEE Trans. Vehicular Technology, vol. 48, no. 5, pp. 1469-1474, Sept. 1999.
    • (1999) IEEE Trans. Vehicular Technology , vol.48 , Issue.5 , pp. 1469-1474
    • Hwang, M.S.1
  • 16
    • 85020598353 scopus 로고
    • "Identity-Based Cryptosystems and Signature Schemes"
    • A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Advances in Cryptology: Proc. Crypto '84, pp. 47-53, 1985.
    • (1985) Advances in Cryptology: Proc. Crypto '84 , pp. 47-53
    • Shamir, A.1
  • 17
    • 0024665726 scopus 로고
    • "Key Distribution System Based on Identification Information"
    • E. Okamota and K. Tanaka, "Key Distribution System Based on Identification Information," IEEE J. Select. Areas in Comm., vol. 7, no. 4, pp. 481-485, 1989.
    • (1989) IEEE J. Select. Areas in Comm. , vol.7 , Issue.4 , pp. 481-485
    • Okamota, E.1    Tanaka, K.2
  • 18
    • 0024664858 scopus 로고
    • "An ID-Based Cryptosystem Based on the Discrete Logarithm Problem"
    • S. Tsujii and T. Itoh, "An ID-Based Cryptosystem Based on the Discrete Logarithm Problem," IEEE J. Selected Areas in Comm., vol. 7, no. 4, pp. 467-473, 1989.
    • (1989) IEEE J. Selected Areas in Comm. , vol.7 , Issue.4 , pp. 467-473
    • Tsujii, S.1    Itoh, T.2
  • 22
  • 23
    • 0017930809 scopus 로고
    • "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems"
    • R.L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 24
    • 0004141908 scopus 로고
    • second ed. Englewood, N.J.: Prentice Hall
    • A.S. Tanenbaum, Computer Networks, second ed. Englewood, N.J.: Prentice Hall, 1988.
    • (1988) Computer Networks
    • Tanenbaum, A.S.1
  • 25
    • 0005301490 scopus 로고
    • "On Data Banks and Privacy Homomorphisms"
    • R.A. DeMillo et al., eds., New York: Academic Press
    • R.L. Rivest, L. Adleman, and M.L. Dertouzos, "On Data Banks and Privacy Homomorphisms," Foundations of Secure Computation, R.A. DeMillo et al., eds., pp. 169-179, New York: Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 169-179
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3
  • 28
    • 0018019325 scopus 로고
    • "Hiding Information and Signatures in Trapdoor Knapsack"
    • Sept
    • R.C. Merkle and M.E. Hellman, "Hiding Information and Signatures in Trapdoor Knapsack," IEEE Trans. Information Theory, vol. 24, no. 5, pp. 525-530, Sept. 1978.
    • (1978) IEEE Trans. Information Theory , vol.24 , Issue.5 , pp. 525-530
    • Merkle, R.C.1    Hellman, M.E.2
  • 32
    • 0021484340 scopus 로고
    • "A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem"
    • Sept
    • A. Shamir, "A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem," IEEE Trans. Information Theory, vol. 30, no. 5, pp. 699-704, Sept. 1984.
    • (1984) IEEE Trans. Information Theory , vol.30 , Issue.5 , pp. 699-704
    • Shamir, A.1
  • 33
    • 0003855464 scopus 로고    scopus 로고
    • second ed. New York: John Wiley & Sons
    • B. Schneier, Applied Cryptography, second ed. New York: John Wiley & Sons, 1996.
    • (1996) Applied Cryptography
    • Schneier, B.1
  • 34
    • 0003496351 scopus 로고
    • "Knapsack Public Key Cryptosystems and Diophantine Approximation"
    • J.C. Lagarias, "Knapsack Public Key Cryptosystems and Diophantine Approximation," Advances in Cryptology: Proc. Crypto '83, pp. 3-23, 1984.
    • (1984) Advances in Cryptology: Proc. Crypto '83 , pp. 3-23
    • Lagarias, J.C.1
  • 35
    • 0018545449 scopus 로고
    • "How to Share a Secret"
    • A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.