-
1
-
-
84969340391
-
Key distribution protocol digital mobile communication systems
-
Springer
-
M. Tatebayashi, N. Matsuzaki, D. Newman, "Key distribution protocol digital mobile communication systems", Advances in Cryptology'89, Springer, 1990 pp. 324-333.
-
(1990)
Advances in Cryptology'89
, pp. 324-333
-
-
Tatebayashi, M.1
Matsuzaki, N.2
Newman, D.3
-
2
-
-
0029223706
-
Anonymity in a mobile computing environment
-
N. Asokan, "Anonymity in a mobile computing environment", in Proc. of MCSA, 1994, pp. 200-204.
-
(1994)
Proc. of MCSA
, pp. 200-204
-
-
Asokan, N.1
-
4
-
-
84883860002
-
Integrated transport layer security: End-to-end security model between WTLS and TLS
-
E.-K. Kwon, Y.-G. Cho, K.-J. Chae, "Integrated transport layer security: end-to-end security model between WTLS and TLS", Information Networking Japan, 2001, pp. 65-71.
-
(2001)
Information Networking Japan
, pp. 65-71
-
-
Kwon, E.-K.1
Cho, Y.-G.2
Chae, K.-J.3
-
5
-
-
84949232747
-
An end-to-end authentication protocol in wireless application protocol
-
Springer, Berlin
-
J.-P. Yang, W. Shin, K.-H. Rhee, "An end-to-end authentication protocol in wireless application protocol", ACISP01, LNCS 2119, Springer, Berlin, 2001, pp. 247-259.
-
(2001)
ACISP01, LNCS 2119
, pp. 247-259
-
-
Yang, J.P.1
Shin, W.2
Rhee, K.H.3
-
6
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
A. Aziz, W. Diffie, "Privacy and authentication for wireless local area networks", IEEE Personal Communication, First Quarter, 1994, 25-31.
-
(1994)
IEEE Personal Communication, First Quarter
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
7
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, M. J. Wiener, "Authentication and authenticated key exchanges", Designs, Codes Crypt., vol. 2, 1992, pp. 107-125.
-
(1992)
Designs, Codes Crypt.
, vol.2
, Issue.4
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
8
-
-
0012845534
-
Public key protocols for wireless communications
-
Korea
-
C. Boyd, D.-G Park., "Public key protocols for wireless communications", Proc. of ICISC'98, Korea, 1998, pp. 47-57.
-
(1998)
Proc. of ICISC'98
, pp. 47-57
-
-
Boyd, C.1
Park, D.-G.2
-
9
-
-
0008517937
-
Authentication and payment in future mobile systems
-
Springer
-
G. Horn, B. Preneel, "Authentication and payment in future mobile systems", ESORICS'98, Springer, 1998.
-
(1998)
ESORICS'98
-
-
Horn, G.1
Preneel, B.2
-
10
-
-
84883868311
-
Technical Specification 3GPP
-
Technical Specification 3GPP, "3G security; security architecture", http//www. 3gpp. org, 2000.
-
(2000)
3G security; Security architecture
-
-
-
12
-
-
0003286492
-
The tls protocol version 1. 0
-
T. Dierks, C. Allen, "The TLS Protocol Version 1. 0", RFC2246, 1999, http://www. ietf. org/rfc/rfc2246. txt.
-
(1999)
RFC2246
-
-
Dierks, T.1
Allen, C.2
-
13
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B. C. Neuman, T. Ts'o, "Kerberos: An authentication service for computer networks", IEEE Comm. Magazine, 1994.
-
(1994)
IEEE Comm. Magazine
-
-
Neuman, B.C.1
Ts'o, T.2
|