-
1
-
-
17144406174
-
-
3GPP, TS 33.102
-
3rd Generation Partnership Project; Technical Specification Group SA; 3G Security, "Security Architecture, version 4.2.0, Release 4," 3GPP, TS 33.102, 2001.
-
(2001)
Security Architecture, Version 4.2.0, Release 4
-
-
-
4
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
1st Qtr.
-
A. Aziz and W. Diffie, "Privacy and authentication for wireless local area networks," IEEE Personal Commun., vol. 1, no. 1, pp. 25-31, 1st Qtr. 1994.
-
(1994)
IEEE Personal Commun.
, vol.1
, Issue.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
5
-
-
0027641891
-
Privacy and authentication on a portable communication system
-
Aug.
-
M. J. Beller, L.-F. Chang, and Y. Yacobi, "Privacy and authentication on a portable communication system," IEEE J. Sel. Areas Commun., vol. 11, no. 6, pp. 821-829, Aug. 1993.
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, Issue.6
, pp. 821-829
-
-
Beller, M.J.1
Chang, L.-F.2
Yacobi, Y.3
-
6
-
-
0027589399
-
Fully-fledged two-way public key authentication and key agreement for low-cost terminals
-
M. Beller and Y. Yacobi, "Fully-fledged two-way public key authentication and key agreement for low-cost terminals," Electron. Lett., vol. 29, pp. 999-1001, 1993.
-
(1993)
Electron. Lett.
, vol.29
, pp. 999-1001
-
-
Beller, M.1
Yacobi, Y.2
-
7
-
-
0029250361
-
The kryptoknight family of light-weight protocols for authentication and key distribution
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung, "The kryptoknight family of light-weight protocols for authentication and key distribution," IEEE/ACM Trans. Networking, vol. 3, pp. 31-41, 1995.
-
(1995)
IEEE/ACM Trans. Networking
, vol.3
, pp. 31-41
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
8
-
-
84956854891
-
Key establishment protocols for secure mobile communications: A selective survey
-
Lecture Notes in Computer Science
-
C. Boyd and A. Mathuria, "Key establishment protocols for secure mobile communications: A selective survey," in Proc. Australian Conf. Information Security and Privacy (ACISP'98), vol. 1438, Lecture Notes in Computer Science, 1998, pp. 344-355.
-
(1998)
Proc. Australian Conf. Information Security and Privacy (ACISP'98)
, vol.1438
, pp. 344-355
-
-
Boyd, C.1
Mathuria, A.2
-
9
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Comput. Syst., vol. 8, pp. 18-36, 1990.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
10
-
-
0033907037
-
"Extensions to an authentication technique proposed for global mobility network
-
Mar.
-
L. Buttyan, C. Gbaguidi, S. Sttmann, and U. Wilhelm, "Extensions to an authentication technique proposed for global mobility network," IEEE Trans. Commun., vol. 48, no. 3, pp. 373-376, Mar. 2000.
-
(2000)
IEEE Trans. Commun.
, vol.48
, Issue.3
, pp. 373-376
-
-
Buttyan, L.1
Gbaguidi, C.2
Sttmann, S.3
Wilhelm, U.4
-
11
-
-
0002378128
-
Optimal privacy and authentication on a portable communications system
-
U. Carlsen, "Optimal privacy and authentication on a portable communications system," Oper. Syst. Rev., vol. 28, pp. 16-23, 1994.
-
(1994)
Oper. Syst. Rev.
, vol.28
, pp. 16-23
-
-
Carlsen, U.1
-
13
-
-
0010413844
-
Modifications to enhance the security of GSM
-
Taipei, Taiwan, R.O.C., May
-
L. Harn and H. Lin, "Modifications to enhance the security of GSM," in Proc. 5th Nat. Conf. Information Security, Taipei, Taiwan, R.O.C., May 1995. pp. 74-76.
-
(1995)
Proc. 5th Nat. Conf. Information Security
, pp. 74-76
-
-
Harn, L.1
Lin, H.2
-
14
-
-
0032676481
-
Enhanced privacy and authentication for the global system for mobile communications
-
C. H. Lee, M. S. Hwang, and W. P. Yang, "Enhanced privacy and authentication for the global system for mobile communications," Wireless Networks, vol. 5, pp. 231-243, 1999.
-
(1999)
Wireless Networks
, vol.5
, pp. 231-243
-
-
Lee, C.H.1
Hwang, M.S.2
Yang, W.P.3
-
18
-
-
0028397595
-
Authentication of mobile users
-
Mar./Apr.
-
R. Molva, D. Samfat, and G. Tsudik, "Authentication of mobile users," IEEE Network, vol. 8, no. 2, pp. 26-34, Mar./Apr. 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.2
, pp. 26-34
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
19
-
-
84947922642
-
On the design of security protocols for mobile communications
-
Lecture Notes in Computer Science
-
Y. Mu and V. Varadharajan, "On the design of security protocols for mobile communications," in Proc. Australian Conf. Information Security and Privacy (ACISP '96), vol. 1172, Lecture Notes in Computer Science, 1996. pp. 134-145.
-
(1996)
Proc. Australian Conf. Information Security and Privacy (ACISP '96)
, vol.1172
, pp. 134-145
-
-
Mu, Y.1
Varadharajan, V.2
-
20
-
-
84969354234
-
On key distribution and authentication in mobile radio networks
-
Lecture Notes in Computer Science
-
C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii, "On key distribution and authentication in mobile radio networks," in Proc. Advances in Cryptology-Eurocrypt, vol. 765, Lecture Notes in Computer Science, 1993, pp. 461-465.
-
(1993)
Proc. Advances in Cryptology-eurocrypt
, vol.765
, pp. 461-465
-
-
Park, C.1
Kurosawa, K.2
Okamoto, T.3
Tsujii, S.4
-
21
-
-
84969340391
-
Key distribution protocol for digital mobile communication systems
-
Lecture Notes in Computer Science
-
M. Tatebayashi, N. Matsuzaki, and D. B. J. Newman, "Key distribution protocol for digital mobile communication systems," in Proc. Advances in Cryptology-Crypto '89, vol. 435, Lecture Notes in Computer Science, 1989, pp. 324-334.
-
(1989)
Proc. Advances in Cryptology-crypto '89
, vol.435
, pp. 324-334
-
-
Tatebayashi, M.1
Matsuzaki, N.2
Newman, D.B.J.3
-
22
-
-
0033605501
-
Inter-protocol interleaving attacks on some authentication and key distribution protocols
-
W. Tzeng and C. Hu, "Inter-protocol interleaving attacks on some authentication and key distribution protocols," Inf. Processing Lett., vol. 69, pp. 297-302, 1999.
-
(1999)
Inf. Processing Lett.
, vol.69
, pp. 297-302
-
-
Tzeng, W.1
Hu, C.2
|