-
1
-
-
85089793376
-
-
rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3G Security, Cryptographic Algorithm Requirements (Release 6), 3GPP TS 33.105 V6.0.0, 2004.
-
rd Generation Partnership Project, "Technical Specification Group Services and System Aspects, 3G Security, Cryptographic Algorithm Requirements (Release 6)," 3GPP TS 33.105 V6.0.0, 2004.
-
-
-
-
2
-
-
85089792943
-
-
rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3G Security, Report on the Evaluation of 3GPP Standard Confidentiality and Integrity Algorithm (Release 1999), 3GPP TS 33.909 Vl.0.0, 2000.
-
rd Generation Partnership Project, "Technical Specification Group Services and System Aspects, 3G Security, Report on the Evaluation of 3GPP Standard Confidentiality and Integrity Algorithm (Release 1999)," 3GPP TS 33.909 Vl.0.0, 2000.
-
-
-
-
3
-
-
85089792163
-
-
rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3G Security, Security Architecture (Release 5), 3GPP TS 33.102 V5.5.0, 2004.
-
rd Generation Partnership Project, "Technical Specification Group Services and System Aspects, 3G Security, Security Architecture (Release 5)," 3GPP TS 33.102 V5.5.0, 2004.
-
-
-
-
4
-
-
0028272762
-
Privacy and Authentication for Wireless Local Area networks
-
A. Aziz, W. Diffie, "Privacy and Authentication for Wireless Local Area networks," IEEE Personal Commun., Vol. 1, pp. 25-31, 1994.
-
(1994)
IEEE Personal Commun
, vol.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
5
-
-
0025386404
-
A Logic of Authentication
-
M. Burrow, M. Abadi, R. Needham, "A Logic of Authentication," ACM Trans. Comput. Syst., Vol. 8, pp. 18-36, 1990.
-
(1990)
ACM Trans. Comput. Syst
, vol.8
, pp. 18-36
-
-
Burrow, M.1
Abadi, M.2
Needham, R.3
-
6
-
-
0027641891
-
Privacy and Authentication on a Portable Communication System
-
M. Beller, L. Chang, Y. Yacobi, "Privacy and Authentication on a Portable Communication System," IEEE J. Sel. Areas Commun., Vol. 11, pp. 821-829, 1993.
-
(1993)
IEEE J. Sel. Areas Commun
, vol.11
, pp. 821-829
-
-
Beller, M.1
Chang, L.2
Yacobi, Y.3
-
7
-
-
0027589399
-
Fully-fledged Two-way Pubic Key Authentication and Key Agreement for Low-cost Terminals
-
M. Beller, Y. Yacobi, "Fully-fledged Two-way Pubic Key Authentication and Key Agreement for Low-cost Terminals," Electron. Lett., Vol. 29, pp. 999-1001, 1993.
-
(1993)
Electron. Lett
, vol.29
, pp. 999-1001
-
-
Beller, M.1
Yacobi, Y.2
-
8
-
-
0026850091
-
Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks
-
S. Bellovin, M. Merritt, "Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks," Research in Security and Privacy, Proceedings IEEE Computer Society Symposium, pp. 72-84, 1992.
-
(1992)
Research in Security and Privacy, Proceedings IEEE Computer Society Symposium
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
10
-
-
17644390205
-
Efficient Authentication Protocols of GSM
-
C. Chang, J. Lee, Y. Chang, "Efficient Authentication Protocols of GSM," Computer Communications, Vol. 28, pp. 921-928, 2005.
-
(2005)
Computer Communications
, vol.28
, pp. 921-928
-
-
Chang, C.1
Lee, J.2
Chang, Y.3
-
11
-
-
33745904732
-
Efficient User Authentication and Key Agreement in Ubiquitous Computing
-
Proc. of the 2006 International Conference on Computational Science and its Applications
-
W. Juang, "Efficient User Authentication and Key Agreement in Ubiquitous Computing," In Proc. of the 2006 International Conference on Computational Science and its Applications, Lecture Notes in Computer Science 3983, pp. 396405, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3983
, pp. 396405
-
-
Juang, W.1
-
12
-
-
36349022520
-
-
NIST FIPS PUB 180, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce, Draft, 1993.
-
NIST FIPS PUB 180, "Secure Hash Standard," National Institute of Standards and Technology, U.S. Department of Commerce, Draft, 1993.
-
-
-
-
13
-
-
0032658583
-
Simple Authenticated Key Agreement Algorithm
-
D. Seo, P. Sweeney, "Simple Authenticated Key Agreement Algorithm," Electronics Lett., Vol. 35, pp. 1073-1074, 1999.
-
(1999)
Electronics Lett
, vol.35
, pp. 1073-1074
-
-
Seo, D.1
Sweeney, P.2
-
15
-
-
11944251256
-
Anonymous Wireless Authentication on a Portable Cellular Mobile System
-
S. Wang, "Anonymous Wireless Authentication on a Portable Cellular Mobile System," IEEE Trans. on Computers, Vol. 53,No. 10, pp. 1317-1329, 2004
-
(2004)
IEEE Trans. on Computers
, vol.53
, Issue.10
, pp. 1317-1329
-
-
Wang, S.1
-
16
-
-
4243165683
-
Cryptanalysis of Simple Authenticated Key Agreement Protocols
-
C. Yang, T. Chang, M. Hwang, "Cryptanalysis of Simple Authenticated Key Agreement Protocols," IEICE Trans. Fundamentals, Vol. E87-A, No. 8, pp. 2174-2176, 2004.
-
(2004)
IEICE Trans. Fundamentals
, vol.E87-A
, Issue.8
, pp. 2174-2176
-
-
Yang, C.1
Chang, T.2
Hwang, M.3
-
17
-
-
17144430885
-
Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol
-
M. Zhang and Y. Fang, "Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol," IEEE Transactions on Wireless Communication, Vol. 4, No. 2, pp. 734-742, 2005.
-
(2005)
IEEE Transactions on Wireless Communication
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
|