메뉴 건너뛰기




Volumn , Issue , 2003, Pages 244-250

An asymmetric authentication protocol for m-commerce applications

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; COMPUTATIONAL CAPABILITY; INTERNET SERVICES; M-COMMERCE APPLICATIONS; MOBILE STATION; SERVICE PROVIDER; WIRELESS ACCESS; WIRELESS ACCESS NETWORKS;

EID: 2442449839     PISSN: 15301346     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCC.2003.1214129     Document Type: Conference Paper
Times cited : (5)

References (14)
  • 1
    • 84969340391 scopus 로고
    • Key distribution protocol digital mobile communication systems
    • Springer
    • M. Tatebayashi, N. Matsuzaki, D. Newman, "Key distribution protocol digital mobile communication systems", Advances in Cryptology'89, Springer, 1990 pp. 324-333.
    • (1990) Advances in Cryptology'89 , pp. 324-333
    • Tatebayashi, M.1    Matsuzaki, N.2    Newman, D.3
  • 2
    • 0029223706 scopus 로고
    • Anonymity in a mobile computing environment
    • N. Asokan, "Anonymity in a mobile computing environment", in Proc. of MCSA, 1994, pp. 200-204.
    • (1994) Proc. of MCSA , pp. 200-204
    • Asokan, N.1
  • 4
    • 84883860002 scopus 로고    scopus 로고
    • Integrated transport layer security: End-to-end security model between WTLS and TLS
    • E.-K. Kwon, Y.-G. Cho, K.-J. Chae, "Integrated transport layer security: end-to-end security model between WTLS and TLS", Information Networking Japan, 2001, pp. 65-71.
    • (2001) Information Networking Japan , pp. 65-71
    • Kwon, E.-K.1    Cho, Y.-G.2    Chae, K.-J.3
  • 5
    • 84949232747 scopus 로고    scopus 로고
    • An end-to-end authentication protocol in wireless application protocol
    • Springer, Berlin
    • J.-P. Yang, W. Shin, K.-H. Rhee, "An end-to-end authentication protocol in wireless application protocol", ACISP01, LNCS 2119, Springer, Berlin, 2001, pp. 247-259.
    • (2001) ACISP01, LNCS 2119 , pp. 247-259
    • Yang, J.P.1    Shin, W.2    Rhee, K.H.3
  • 8
    • 0012845534 scopus 로고    scopus 로고
    • Public key protocols for wireless communications
    • Korea
    • C. Boyd, D.-G Park., "Public key protocols for wireless communications", Proc. of ICISC'98, Korea, 1998, pp. 47-57.
    • (1998) Proc. of ICISC'98 , pp. 47-57
    • Boyd, C.1    Park, D.-G.2
  • 9
    • 0008517937 scopus 로고    scopus 로고
    • Authentication and payment in future mobile systems
    • Springer
    • G. Horn, B. Preneel, "Authentication and payment in future mobile systems", ESORICS'98, Springer, 1998.
    • (1998) ESORICS'98
    • Horn, G.1    Preneel, B.2
  • 10
    • 84883868311 scopus 로고    scopus 로고
    • Technical Specification 3GPP
    • Technical Specification 3GPP, "3G security; security architecture", http//www. 3gpp. org, 2000.
    • (2000) 3G security; Security architecture
  • 12
    • 0003286492 scopus 로고    scopus 로고
    • The tls protocol version 1. 0
    • T. Dierks, C. Allen, "The TLS Protocol Version 1. 0", RFC2246, 1999, http://www. ietf. org/rfc/rfc2246. txt.
    • (1999) RFC2246
    • Dierks, T.1    Allen, C.2
  • 13
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • B. C. Neuman, T. Ts'o, "Kerberos: An authentication service for computer networks", IEEE Comm. Magazine, 1994.
    • (1994) IEEE Comm. Magazine
    • Neuman, B.C.1    Ts'o, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.