-
1
-
-
0028272762
-
"Privacy and authentication for wireless local area networks"
-
A. Aziz and W. Diffie, "Privacy and authentication for wireless local area networks," IEEE Pers. Commun., vol. 1, no. 1, pp. 24-31, 1994.
-
(1994)
IEEE Pers. Commun.
, vol.1
, Issue.1
, pp. 24-31
-
-
Aziz, A.1
Diffie, W.2
-
2
-
-
0027641891
-
"Privacy and authentication on a portable communications system"
-
Aug
-
M. J. Beller, L. E Chang, and Y. Yacobi, "Privacy and authentication on a portable communications system," IEEE J. Sel. Areas Commun., vol. 11, no. 6, pp. 821-829, Aug. 1993.
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, Issue.6
, pp. 821-829
-
-
Beller, M.J.1
Chang, L.F.2
Yacobi, Y.3
-
3
-
-
2142759434
-
"End-to-end security protocol for mobile communications with end-user identification/authentication"
-
Jan
-
C.-C. Chang, K.-L. Chen, and M.-S. Hwang, "End-to-end security protocol for mobile communications with end-user identification/authentication," Wirel. Pers. Commun., vol. 28, no. 2, pp. 95-106, Jan. 2004.
-
(2004)
Wirel. Pers. Commun.
, vol.28
, Issue.2
, pp. 95-106
-
-
Chang, C.-C.1
Chen, K.-L.2
Hwang, M.-S.3
-
4
-
-
0036409380
-
"An improvement of mobile users authentication in the integration environments"
-
M.-S. Hwang, C.-C. Lee, and W.-P. Yang, "An improvement of mobile users authentication in the integration environments," Int. J. Electron. Commun., vol. 56, no. 5, pp. 293-297, 2002.
-
(2002)
Int. J. Electron. Commun.
, vol.56
, Issue.5
, pp. 293-297
-
-
Hwang, M.-S.1
Lee, C.-C.2
Yang, W.-P.3
-
5
-
-
0031144513
-
"Authenticated key-exchange in a mobile radio network"
-
M.-S. Hwang and C.-H. Lee, "Authenticated key-exchange in a mobile radio network," Eur. Trans. Telecommun., vol. 8, no. 3, pp. 265-269, 1997.
-
(1997)
Eur. Trans. Telecommun.
, vol.8
, Issue.3
, pp. 265-269
-
-
Hwang, M.-S.1
Lee, C.-H.2
-
6
-
-
0029256120
-
"Conference key distribution protocols for digital mobile communication systems"
-
Feb
-
M.-S. Hwang and W.-P. Yang, "Conference key distribution protocols for digital mobile communication systems," IEEE J. Sel. Areas Commun., vol. 13, no. 2, pp. 416-420, Feb. 1995.
-
(1995)
IEEE J. Sel. Areas Commun.
, vol.13
, Issue.2
, pp. 416-420
-
-
Hwang, M.-S.1
Yang, W.-P.2
-
7
-
-
4544330565
-
"Extension of authentication protocol for GSM"
-
Apr
-
C.-C. Lee, M.-S. Hwang, and W.-P. Yang, "Extension of authentication protocol for GSM," Proc. Inst. Electr. Eng. - Commun., vol. 150, no. 2, pp. 91-95, Apr. 2003.
-
(2003)
Proc. Inst. Electr. Eng. - Commun.
, vol.150
, Issue.2
, pp. 91-95
-
-
Lee, C.-C.1
Hwang, M.-S.2
Yang, W.-P.3
-
8
-
-
0345306310
-
"A new privacy and authentication protocol for end-to-end mobile users"
-
C.-C. Lee, C.-C. Yang, and M.-S. Hwang, "A new privacy and authentication protocol for end-to-end mobile users," Int. J. Commun. Syst., vol. 16, no. 9, pp. 799-808, 2003.
-
(2003)
Int. J. Commun. Syst.
, vol.16
, Issue.9
, pp. 799-808
-
-
Lee, C.-C.1
Yang, C.-C.2
Hwang, M.-S.3
-
9
-
-
0032676481
-
"Enhanced privacy and authentication for the global system of mobile communications"
-
Jul
-
C.-H. Lee, M.-S. Hwang, and W.-P. Yang, "Enhanced privacy and authentication for the global system of mobile communications," Wirel. Netw., vol. 5, no. 4, pp. 231-243, Jul. 1999.
-
(1999)
Wirel. Netw.
, vol.5
, Issue.4
, pp. 231-243
-
-
Lee, C.-H.1
Hwang, M.-S.2
Yang, W.-P.3
-
10
-
-
0032682170
-
"Hash-based encryption system"
-
M. Peyravian, A. Roginsky, and N. Zunic, "Hash-based encryption system," Comput. Secur., vol. 18, no. 4, pp. 345-350, 1999.
-
(1999)
Comput. Secur.
, vol.18
, Issue.4
, pp. 345-350
-
-
Peyravian, M.1
Roginsky, A.2
Zunic, N.3
-
11
-
-
12444324513
-
"Providing secrecy in key management protocols for large wireless sensors networks"
-
R. D. Pietro, L. V. Mancini, and S. Jajodia, "Providing secrecy in key management protocols for large wireless sensors networks," Ad Hoc Netw., vol. 1, no. 4, pp. 455-468, 2003.
-
(2003)
Ad Hoc Netw.
, vol.1
, Issue.4
, pp. 455-468
-
-
Pietro, R.D.1
Mancini, L.V.2
Jajodia, S.3
-
12
-
-
84874730829
-
"An efficient authentication scheme between MANET and WLAN based on mobile IPv6"
-
C.-W. Chen, M.-C. Chuang, and C.-S. Tsai, "An efficient authentication scheme between MANET and WLAN based on mobile IPv6," Int. J. Netw. Secur., vol. 1, no. 1, pp. 12-19, 2005.
-
(2005)
Int. J. Netw. Secur.
, vol.1
, Issue.1
, pp. 12-19
-
-
Chen, C.-W.1
Chuang, M.-C.2
Tsai, C.-S.3
-
13
-
-
33748196456
-
"Man-in-the-middle attack on the authentication of the user from the remote autonomous object"
-
C.-Y. Yang, C.-C. Lee, and S.-Y. Hsiao, "Man-in-the-middle attack on the authentication of the user from the remote autonomous object," Int. J. Netw. Secur., vol. 1, no. 1, pp. 22-24, 2005.
-
(2005)
Int. J. Netw. Secur.
, vol.1
, Issue.1
, pp. 22-24
-
-
Yang, C.-Y.1
Lee, C.-C.2
Hsiao, S.-Y.3
-
14
-
-
1942487780
-
"A new authentication scheme with anonymity for wireless environments"
-
Feb
-
J. Zhu and J. Ma, "A new authentication scheme with anonymity for wireless environments," IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 230-234, Feb. 2004.
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.1
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
|