-
1
-
-
0029250361
-
The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung, "The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution," IEEE/ACM Transactions on Networking, vol. 3, no. 1, pp. 31-41, 1995.
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.1
, pp. 31-41
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
2
-
-
1542634054
-
Seven Comments on Charging and Billing
-
P. Ginzboorg, "Seven Comments on Charging and Billing," Communications of the ACM, vol. 43, no. 11, pp. 89-92, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.11
, pp. 89-92
-
-
Ginzboorg, P.1
-
3
-
-
0036505541
-
Authentication Protocols for Mobile Network Environment Value-Added Services
-
G. Horn, K. M. Martin and C. Mitchell, "Authentication Protocols for Mobile Network Environment Value-Added Services," IEEE Transactions on Vehicular Technology, vol. 51, no. 2, pp. 383-392, 2002.
-
(2002)
IEEE Transactions on Vehicular Technology
, vol.51
, Issue.2
, pp. 383-392
-
-
Horn, G.1
Martin, K.M.2
Mitchell, C.3
-
4
-
-
84958780603
-
Authentication and Payment in Future Mobile Systems
-
LNCS
-
G. Horn and B. Preneel, "Authentication and Payment in Future Mobile Systems," European Symposium on Research in Computer Security, LNCS, vol. 1485, pp. 277-293, 1998.
-
(1998)
European Symposium on Research in Computer Security
, vol.1485
, pp. 277-293
-
-
Horn, G.1
Preneel, B.2
-
5
-
-
0033725848
-
Authentication and Payment in Future Mobile Systems
-
G. Horn and B. Preneel, "Authentication and Payment in Future Mobile Systems," Journal of Computer Security, vol. 8, pp. 183-207, 2000.
-
(2000)
Journal of Computer Security
, vol.8
, pp. 183-207
-
-
Horn, G.1
Preneel, B.2
-
6
-
-
0031361979
-
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
-
Kobe, Japan
-
P. Janson, G. Tsudik and M. Yung, "Scalability and Flexibility in Authentication Services: The KryptoKnight Approach," Proceedings of the 6th Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution., Kobe, Japan, vol. 2, pp. 725-736, 1997.
-
(1997)
Proceedings of the 6th Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
, vol.2
, pp. 725-736
-
-
Janson, P.1
Tsudik, G.2
Yung, M.3
-
7
-
-
79957632364
-
Authentication Protocols for Personal Communication Systems
-
Cambridge, Massachusetts, United States
-
H. Y. Lin and L. Harn, "Authentication Protocols for Personal Communication Systems," Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, Massachusetts, United States, pp. 256-261, 1995.
-
(1995)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 256-261
-
-
Lin, H.Y.1
Harn, L.2
-
8
-
-
22044447040
-
Secure Billing for Mobile Information Services in UMTS
-
Antwerp, Belgium
-
K. M. Martin, B. Preneel, C. J. Mitchell, H. J. Hitz, G. Horn, A. Poliakova and P. Howard, "Secure Billing for Mobile Information Services in UMTS," Proceedings of the 5th International Conference on Intelligence and Services in Networks, Antwerp, Belgium, pp. 535-548, 1998.
-
(1998)
Proceedings of the 5th International Conference on Intelligence and Services in Networks
, pp. 535-548
-
-
Martin, K.M.1
Preneel, B.2
Mitchell, C.J.3
Hitz, H.J.4
Horn, G.5
Poliakova, A.6
Howard, P.7
-
9
-
-
21144468597
-
KryptoKnight Authentication and Key Distribution System
-
Toulouse, France
-
R. Molva, G Tsudik, E. V. Herreweghen and S. Zatti, "KryptoKnight Authentication and Key Distribution System," Proceedings of ESORICS 92, Toulouse, France, pp. 155-174, 1992.
-
(1992)
Proceedings of ESORICS 92
, pp. 155-174
-
-
Molva, R.1
Tsudik, G.2
Herreweghen, E.V.3
Zatti, S.4
-
10
-
-
84944034370
-
A Contemporary Foreword on GSM Security
-
Bristol, UK, LNCS 2437
-
P. S. Pagliusi, "A Contemporary Foreword on GSM Security," Proceedings of the International Conference on Infrastructure Security, Bristol, UK, LNCS 2437, pp. 129-144, 2002.
-
(2002)
Proceedings of the International Conference on Infrastructure Security
, pp. 129-144
-
-
Pagliusi, P.S.1
-
11
-
-
84944291851
-
Overview of the GSM System and Protocol Architecture
-
M. Rahnema, "Overview of the GSM System and Protocol Architecture," IEEE Communications Magazine, pp. 92-100, 1993.
-
(1993)
IEEE Communications Magazine
, pp. 92-100
-
-
Rahnema, M.1
-
13
-
-
0032639528
-
A New Authentication Protocol for Roaming Users in GSM Networks
-
Red Sea, Egypt
-
K. A. Tawil and A. Akrami, "A New Authentication Protocol for Roaming Users in GSM Networks," Proceedings of the 4th IEEE International Symposium on Computers and Communications, Red Sea, Egypt, pp. 93-99, 1999.
-
(1999)
Proceedings of the 4th IEEE International Symposium on Computers and Communications
, pp. 93-99
-
-
Tawil, K.A.1
Akrami, A.2
-
14
-
-
0031632002
-
A Protocol for Billing Mobile Network Access Devices Operating in Foreign Networks
-
Stanford, USA
-
W. I. Wang and C. W. Wu, "A Protocol for Billing Mobile Network Access Devices Operating in Foreign Networks," Proceedings of the 7th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Stanford, USA, pp. 262-268, 1998.
-
(1998)
Proceedings of the 7th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 262-268
-
-
Wang, W.I.1
Wu, C.W.2
-
15
-
-
85054451140
-
Undeniable Billing in Mobile Communication
-
Dallas, Texas
-
J. Zhou and K. Y. Lam, "Undeniable Billing in Mobile Communication," Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Dallas, Texas, pp. 284-290, 1998.
-
(1998)
Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 284-290
-
-
Zhou, J.1
Lam, K.Y.2
|