-
1
-
-
33746074671
-
Security related network functions
-
3G TS 03.20: Sophia Antipolis, France
-
3G TS 03.20: Security related network functions, 3GPP, Sophia Antipolis, France, 2001
-
(2001)
3GPP
-
-
-
2
-
-
33746067764
-
3G security; security architetcure (Release 6)
-
3G TS 33.102: Sophia Antipolis, France
-
3G TS 33.102: 3G Security; Security architetcure (Release 6), 3GPP, Sophia Antipolis, France, 2004
-
(2004)
3GPP
-
-
-
3
-
-
33746046239
-
Principles for cellular access security
-
Espoo, Finland, Nov.
-
G.M. Køien, Principles for Cellular Access Security, In Proceedings of the Ninth Nordic Workshop on Secure IT Systems, pp.65-72, Espoo, Finland, Nov. 2004
-
(2004)
Proceedings of the Ninth Nordic Workshop on Secure IT Systems
, pp. 65-72
-
-
Køien, G.M.1
-
4
-
-
1842815892
-
An introduction to access security in UMTS
-
Feb.
-
G.M. Køien, An Introduction to Access Security in UMTS. IEEE Wireless Communications Mag., Vol.11, No.1, pp.8-18, Feb. 2004
-
(2004)
IEEE Wireless Communications Mag.
, vol.11
, Issue.1
, pp. 8-18
-
-
Køien, G.M.1
-
5
-
-
1842765616
-
Access security in CDMA2000, including a comparison with UMTS access security
-
Feb.
-
G. Rose, G.M. Køien, Access Security in CDMA2000, Including a Comparison with UMTS Access Security. IEEE Wireless Communications Mag., Vol.11, No.1, pp. 19-25, Feb. 2004
-
(2004)
IEEE Wireless Communications Mag.
, vol.11
, Issue.1
, pp. 19-25
-
-
Rose, G.1
Køien, G.M.2
-
7
-
-
33746068877
-
Privacy-preserving spatially aware authentication protocols: Analysis and solutions
-
Gjøvik, Norway
-
G.M.Køien and V.A.Oleshchuk, Privacy-Preserving Spatially Aware Authentication Protocols: Analysis and Solutions, In Proceedings of NORDSEC 2003, pp. 161-173, Gjøvik, Norway, 2003
-
(2003)
Proceedings of NORDSEC 2003
, pp. 161-173
-
-
Køien, G.M.1
Oleshchuk, V.A.2
-
8
-
-
33749010710
-
Spatio-temporal exposure control; An investigation of spatial home control and location privacy issues
-
Beijing, China, Sep.
-
G.M. Køien and V.A. Oleshchuk, Spatio-Temporal Exposure Control; An investigation of spatial home control and location privacy issues, In Proceedings of the 14th Annual IEEE Symposium on Personal Indoor Mobile Radio Communications (PIMRC), pp.2760-2764, Beijing, China, Sep. 2003
-
(2003)
Proceedings of the 14th Annual IEEE Symposium on Personal Indoor Mobile Radio Communications (PIMRC)
, pp. 2760-2764
-
-
Køien, G.M.1
Oleshchuk, V.A.2
-
9
-
-
0003470642
-
Security architecture for the Internet protocol
-
RFC 2401, Nov.
-
S. Kent, and R. Atkinson, Security Architecture for the Internet Protocol, RFC 2401, IETF, Nov. 1998
-
(1998)
IETF
-
-
Kent, S.1
Atkinson, R.2
-
10
-
-
33746090769
-
Rethinking cellular access security
-
Cambridge, MA, USA, Nov.
-
G.M. Køien, Rethinking Cellular Access Security, In Proceedings of the Second IASTED Intl. Conf. on Comm. and Computer Networks, pp.212-218, Cambridge, MA, USA, Nov. 2004
-
(2004)
Proceedings of the Second IASTED Intl. Conf. on Comm. and Computer Networks
, pp. 212-218
-
-
Køien, G.M.1
-
11
-
-
33746050219
-
3G TS 33.234: 3G security; wireless Local Area Network (WLAN) interworking security (release 6)
-
Sophia Antipolis, France
-
3G TS 33.234: 3G Security; Wireless Local Area Network (WLAN) Interworking Security (Release 6), 3GPP, Sophia Antipolis, France, 2004
-
(2004)
3GPP
-
-
-
12
-
-
0242527195
-
Security aspects of 3G-WLAN interworking
-
Nov.
-
G.M. Køien, T. Haslestad, Security Aspects of 3G-WLAN Interworking. IEEE Communications Mag., Vol.41, No.11, pp.82-88, Nov. 2003
-
(2003)
IEEE Communications Mag.
, vol.41
, Issue.11
, pp. 82-88
-
-
Køien, G.M.1
Haslestad, T.2
-
13
-
-
0142188056
-
Initiator-resilient universally composable key exchange
-
ESORICS 2003, Springer-Verlag, Gjøvik, Norway
-
D. Hofheinz, J. Mller-Quade, and R. Steinwandt, Initiator-Resilient Universally Composable Key Exchange, ESORICS 2003, LNCS 2808, pp.61-84, Springer-Verlag, Gjøvik, Norway, 2003
-
(2003)
LNCS
, vol.2808
, pp. 61-84
-
-
Hofheinz, D.1
Mller-Quade, J.2
Steinwandt, R.3
-
14
-
-
84944878354
-
-
ISBN 0-8493-8523-7, CRC Press, June
-
A.J. Menezes, P.C van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography (5th printing). ISBN 0-8493-8523-7, CRC Press, June 2001
-
(2001)
Handbook of Applied Cryptography (5th Printing)
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
15
-
-
0009733453
-
A one round protocol for Tripartite Diffie-Hellman
-
LNCS 1838, Springer-Verlag
-
A. Joux, A One Round Protocol for Tripartite Diffie-Hellman, In Proc. ANTS-IV 2000, LNCS 1838, Springer-Verlag, 2000
-
(2000)
Proc. ANTS-IV 2000
-
-
Joux, A.1
-
16
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
PP-47-53, LNCS 196, Springer-Verlag
-
A. Shamir, Identity-based cryptosystems and signature schemes, In Proc. CRYPTO 1984, PP-47-53, LNCS 196, Springer-Verlag, 1984
-
(1984)
Proc. CRYPTO 1984
-
-
Shamir, A.1
-
17
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
Feb.
-
K. Lauter, The Advantages of Elliptic Curve Cryptography for Wireless Security. IEEE Wireless Communications Mag., Vol.11, No.1, pp.62-67, Feb. 2004
-
(2004)
IEEE Wireless Communications Mag.
, vol.11
, Issue.1
, pp. 62-67
-
-
Lauter, K.1
-
20
-
-
0242496951
-
Secure multy-party computation problems and their applications: A review and open problems
-
Sep. 10-13
-
W. Du and M.J. Atallah. Secure Multy-Party Computation Problems and Their Applications: A Review and Open Problems, NSPW'01, pp. 13-21, Sep. 10-13, 2002
-
(2002)
NSPW'01
, pp. 13-21
-
-
Du, W.1
Atallah, M.J.2
-
21
-
-
0242612156
-
A practical approach to solve secure multi-party computational problems
-
Sep. 23-26
-
W.Du and Z. Zhan, A Practical Approach to Solve Secure Multi-Party Computational Problems. In Proceedings of New Security Paradigms Workshop, Sep. 23-26, 2002
-
(2002)
Proceedings of New Security Paradigms Workshop
-
-
Du, W.1
Zhan, Z.2
-
25
-
-
84956852274
-
An efficient public-key cryptosystem as secure as factoring
-
LNCS 1403
-
T. Okamoto and S. Uchiyama. An Efficient Public-Key Cryptosystem as Secure as Factoring. In Advanced in Cryptography - EUROCRYPT'98, LNCS 1403, pp. 308-318, 1998
-
(1998)
Advanced in Cryptography - EUROCRYPT'98
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
26
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
LNCS 1592
-
P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT'99, LNCS 1592, pp. 223-238, 1999
-
(1999)
EUROCRYPT'99
, pp. 223-238
-
-
Paillier, P.1
-
29
-
-
33746035528
-
3G TS 23.271: Functional stage 2 description of Location Services (LCS)
-
Sophia Antipolis, France
-
3G TS 23.271: Functional stage 2 description of Location Services (LCS), 3GPP, Sophia Antipolis, France, 2004
-
(2004)
3GPP
-
-
|