-
1
-
-
13144295047
-
An efficient wireless transmission method for m-commerce
-
Abuelyaman, E. and Wen, H.J. (2004) 'An efficient wireless transmission method for m-commerce', Int. J. Mobile Communications, Vol. 2, pp.405-417.
-
(2004)
Int. J. Mobile Communications
, vol.2
, pp. 405-417
-
-
Abuelyaman, E.1
Wen, H.J.2
-
2
-
-
0242335649
-
Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications
-
Barbancho, A.M. and Peinado, A. (2003) 'Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications', Computer Networks, Vol. 43, pp.777-785.
-
(2003)
Computer Networks
, vol.43
, pp. 777-785
-
-
Barbancho, A.M.1
Peinado, A.2
-
4
-
-
10044260029
-
An efficient password authenticated key exchange protocol for imbalanced wireless networks
-
Chang, Y.F., Chang, C.C. and Yang, J.H. (2004) 'An efficient password authenticated key exchange protocol for imbalanced wireless networks', Computer Standards and Interfaces, Vol. 27, pp.313-322.
-
(2004)
Computer Standards and Interfaces
, vol.27
, pp. 313-322
-
-
Chang, Y.F.1
Chang, C.C.2
Yang, J.H.3
-
5
-
-
2142759434
-
End-to-end security protocols for mobile communications with end-user identification/ authentication
-
Chang, C.C., Chen, K.L. and Hwang, M.S. (2004) 'End-to-end security protocols for mobile communications with end-user identification/ authentication', Wireless Personal Communications, Vol. 28, pp.95-106.
-
(2004)
Wireless Personal Communications
, vol.28
, pp. 95-106
-
-
Chang, C.C.1
Chen, K.L.2
Hwang, M.S.3
-
6
-
-
17644390205
-
Efficient authentication protocols of GSM
-
Chang, C.C., Lee, J.S. and Chang, Y.F. (2005) 'Efficient authentication protocols of GSM', Computer Communications, Vol. 28, pp.921-928.
-
(2005)
Computer Communications
, vol.28
, pp. 921-928
-
-
Chang, C.C.1
Lee, J.S.2
Chang, Y.F.3
-
7
-
-
33645970770
-
A secure and efficient authentication scheme for mobile users
-
Chang, Y.F., Lee, J.S. and Chang, C.C. (2006) 'A secure and efficient authentication scheme for mobile users', Int. J. Mobile Communications, Vol. 4, pp.581-594.
-
(2006)
Int. J. Mobile Communications
, vol.4
, pp. 581-594
-
-
Chang, Y.F.1
Lee, J.S.2
Chang, C.C.3
-
8
-
-
2342607999
-
Light-weight authentication and billing in mobile communications
-
Chen, H.B. and Hsueh, S.C. (2003) 'Light-weight authentication and billing in mobile communications', Paper presented in the Proceedings of the 37th IEEE International Carnahan Conference on Security Technology, Taipei, Taiwan: ICCST, pp.245-252.
-
(2003)
Paper presented in the Proceedings of the 37th IEEE International Carnahan Conference on Security Technology, Taipei, Taiwan: ICCST
, pp. 245-252
-
-
Chen, H.B.1
Hsueh, S.C.2
-
9
-
-
84958780603
-
-
Horn, G. and Preneel, B. (1998) 'Authentication and payment in future mobile systems'. Paper presented in the Proceedings of the 5th European Symposium on Research in Computer Security, pp.277-293.
-
Horn, G. and Preneel, B. (1998) 'Authentication and payment in future mobile systems'. Paper presented in the Proceedings of the 5th European Symposium on Research in Computer Security, pp.277-293.
-
-
-
-
10
-
-
0036505541
-
Authentication protocols for mobile network environment value-added services
-
Horn, G., Martin, K.M. and Mitchell, C.J. (2002) 'Authentication protocols for mobile network environment value-added services', IEEE Transactions on Vehicular Technology, Vol. 51, pp.383-392.
-
(2002)
IEEE Transactions on Vehicular Technology
, vol.51
, pp. 383-392
-
-
Horn, G.1
Martin, K.M.2
Mitchell, C.J.3
-
12
-
-
4644296350
-
Research areas and challenges for mobile information systems
-
Krogstie, J., Lyytinen, K., Opdahl, A.L., Pernici, B., Siau, K. and Smolander, K. (2004) 'Research areas and challenges for mobile information systems', Int. J. Mobile Communications, Vol. 2, pp.220-234.
-
(2004)
Int. J. Mobile Communications
, vol.2
, pp. 220-234
-
-
Krogstie, J.1
Lyytinen, K.2
Opdahl, A.L.3
Pernici, B.4
Siau, K.5
Smolander, K.6
-
13
-
-
2942554940
-
Mobile communications: Global trends in the 21st century
-
Kumar, S. (2004) 'Mobile communications: global trends in the 21st century'. Int. J. Mobile Communications, Vol. 2, pp.67-86.
-
(2004)
Int. J. Mobile Communications
, vol.2
, pp. 67-86
-
-
Kumar, S.1
-
14
-
-
20144378400
-
Consumer value creation in mobile banking services
-
Laukkanen, T. and Lauroene, J. (2005) 'Consumer value creation in mobile banking services', Int. J. Mobile Communications, Vol. 3, pp.325-338.
-
(2005)
Int. J. Mobile Communications
, vol.3
, pp. 325-338
-
-
Laukkanen, T.1
Lauroene, J.2
-
15
-
-
84961557251
-
A framework for delivering secure mobile location information
-
Olla, P. and Patel, N.V. (2003) 'A framework for delivering secure mobile location information', Int. J. Mobile Communications, Vol. 1, pp.289-300.
-
(2003)
Int. J. Mobile Communications
, vol.1
, pp. 289-300
-
-
Olla, P.1
Patel, N.V.2
-
16
-
-
0346895307
-
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
-
Park, C.S. (2004) 'Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems', Computer Networks. Vol. 44, pp.267 273.
-
(2004)
Computer Networks
, vol.44
, pp. 267-273
-
-
Park, C.S.1
-
17
-
-
26444495514
-
Wireless authentication protocol preserving user anonymity
-
Japan, pp
-
Park, J., Go, J. and Kim, K. (2001) 'Wireless authentication protocol preserving user anonymity', Paper presented in the Proceedings of the 2001 Symposium on Cryptography and Information Security, Japan, pp.23-28.
-
(2001)
Paper presented in the Proceedings of the 2001 Symposium on Cryptography and Information Security
, pp. 23-28
-
-
Park, J.1
Go, J.2
Kim, K.3
-
18
-
-
4544286919
-
Privacy and authentication protocol providing anonymous channels in GSM
-
Peinado, A. (2004) 'Privacy and authentication protocol providing anonymous channels in GSM', Computer Communications, Vol. 27, pp. 1709-1715.
-
(2004)
Computer Communications
, vol.27
, pp. 1709-1715
-
-
Peinado, A.1
-
19
-
-
3042737904
-
Wireless security's future
-
Potter, B. (2003) 'Wireless security's future', IEEE Security and Privacy, Vol. 1, pp.68-72.
-
(2003)
IEEE Security and Privacy
, vol.1
, pp. 68-72
-
-
Potter, B.1
-
20
-
-
84944291851
-
Overview of the GSM system and protocol architecture
-
Rahnema, M. (1993) 'Overview of the GSM system and protocol architecture', IEEE Communications Magazine, Vol. 31, pp.92-100.
-
(1993)
IEEE Communications Magazine
, vol.31
, pp. 92-100
-
-
Rahnema, M.1
-
21
-
-
0029232793
-
-
Samfat, D. and Molva, R. (1994) 'A method providing identity privacy to mobile users during authentication', Paper presented in the Proceedings of the Workshop on Mobile Computing Systems and Applications, pp. 196-199.
-
Samfat, D. and Molva, R. (1994) 'A method providing identity privacy to mobile users during authentication', Paper presented in the Proceedings of the Workshop on Mobile Computing Systems and Applications, pp. 196-199.
-
-
-
-
22
-
-
0028762819
-
An authentication protocol for mobile users
-
4/7
-
Samfat, D., Molva, R. and Tsudik, G. (1994) 'An authentication protocol for mobile users', IEE Colloquium on Security and Cryptography Applications to Radio Systems, pp.4/1-4/7.
-
(1994)
IEE Colloquium on Security and Cryptography Applications to Radio Systems
, pp. 4-1
-
-
Samfat, D.1
Molva, R.2
Tsudik, G.3
-
23
-
-
0003851399
-
-
2nd ed, p, New York, NY: John Wiley and Sons Inc
-
Schneier, B. (1996) Applied cryptography, protocols, algorithms, and source code in C (2nd ed.) (p.15). New York, NY: John Wiley and Sons Inc.
-
(1996)
Applied cryptography, protocols, algorithms, and source code in C
, pp. 15
-
-
Schneier, B.1
-
24
-
-
33644593718
-
Mobile and wireless networks: Services, evolution and issues
-
Shim, J.P., Varshney, U., Dekleva, S. and Knoerzer, G. (2006) 'Mobile and wireless networks: services, evolution and issues', Int. J. Mobile Communications, Vol. 4, pp.405-417.
-
(2006)
Int. J. Mobile Communications
, vol.4
, pp. 405-417
-
-
Shim, J.P.1
Varshney, U.2
Dekleva, S.3
Knoerzer, G.4
-
25
-
-
2942690217
-
-
Tseng, Y.M., Yang, C.C. and Su, J.H. (2004) 'An efficient authentication protocol for integrating WLAN and cellular networks', Paper presented in the Proceedings of the 6th International Conference on Advanced Communication Technology, pp.416-420.
-
Tseng, Y.M., Yang, C.C. and Su, J.H. (2004) 'An efficient authentication protocol for integrating WLAN and cellular networks', Paper presented in the Proceedings of the 6th International Conference on Advanced Communication Technology, pp.416-420.
-
-
-
-
26
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Zhu, J. and Ma, J. (2004) 'A new authentication scheme with anonymity for wireless environments', IEEE Transactions on Consumer Electronics, Vol. 50, pp.231-235.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, pp. 231-235
-
-
Zhu, J.1
Ma, J.2
|