-
1
-
-
84875347025
-
An efficient authentication protocol for GSM networks
-
IEEE Service Center, Munich, Germany
-
Hwang M-S, Tang Y-L, Lee C-C. An efficient authentication protocol for GSM networks. In AFCEA/IEEE EuroComm '2000, IEEE Service Center, Munich, Germany, 2000; 326-330.
-
(2000)
AFCEA/IEEE EuroComm '2000
, pp. 326-330
-
-
Hwang, M.-S.1
Tang, Y.-L.2
Lee, C.-C.3
-
3
-
-
84944291851
-
Overview of the GSM system and protocol architecture
-
Rahnema M. Overview of the GSM system and protocol architecture. IEEE Communication Magazine 1993; 31(4): 92-100.
-
(1993)
IEEE Communication Magazine
, vol.31
, Issue.4
, pp. 92-100
-
-
Rahnema, M.1
-
4
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
Aziz A, Diffie W. Privacy and authentication for wireless local area networks. IEEE Personal Communications 1994; 1(1): 24-31.
-
(1994)
IEEE Personal Communications
, vol.1
, Issue.1
, pp. 24-31
-
-
Aziz, A.1
Diffie, W.2
-
7
-
-
0029359261
-
Techniques for privacy and authentication in personal communication systems
-
Brown D. Techniques for privacy and authentication in personal communication systems. IEEE Personal Communications 1995; 2(4): 6-10.
-
(1995)
IEEE Personal Communications
, vol.2
, Issue.4
, pp. 6-10
-
-
Brown, D.1
-
10
-
-
0029256120
-
Conference key distribution protocols for digital mobile communication systems
-
Hwang M-S, Yang WP. Conference key distribution protocols for digital mobile communication systems. IEEE Journal on Selected Areas in Communications 1995; 13(2): 416-420.
-
(1995)
IEEE Journal on Selected Areas in Communications
, vol.13
, Issue.2
, pp. 416-420
-
-
Hwang, M.-S.1
Yang, W.P.2
-
13
-
-
4544286919
-
Privacy and authentication protocol providing anonymous channels in GSM
-
Peinado A. Privacy and authentication protocol providing anonymous channels in GSM, Computer Communications 2004; 27(17): 1709-1715.
-
(2004)
Computer Communications
, vol.27
, Issue.17
, pp. 1709-1715
-
-
Peinado, A.1
-
14
-
-
34250216845
-
-
Singelee D1 Preneel B. The Wireless Application Protocol. International Journal of Network Security 2005; 1(3): 161-165.
-
Singelee D1 Preneel B. The Wireless Application Protocol. International Journal of Network Security 2005; 1(3): 161-165.
-
-
-
-
16
-
-
46749104657
-
An estimate of network database transaction volume to support universal personal communication services. 8th ITC Specialist Seminar on Universal Personal
-
Lo C-N, Wolff R-S, Bernhardt R-C. An estimate of network database transaction volume to support universal personal communication services. 8th ITC Specialist Seminar on Universal Personal Telecommunications, 1992, pp, 236-241.
-
(1992)
Telecommunications
, pp. 236-241
-
-
Lo, C.-N.1
Wolff, R.-S.2
Bernhardt, R.-C.3
-
17
-
-
0000875129
-
Performance modeling of an auxiliary user location strategy in a PCS network
-
Jain R, Lin YB. Performance modeling of an auxiliary user location strategy in a PCS network. ACM-Baltzer Wireless Networks 1995; 1(2): 197-210.
-
(1995)
ACM-Baltzer Wireless Networks
, vol.1
, Issue.2
, pp. 197-210
-
-
Jain, R.1
Lin, Y.B.2
-
18
-
-
0344756159
-
Location tracking with distributed HLR's and pointer forwarding
-
Lin YB. Tsai WN. Location tracking with distributed HLR's and pointer forwarding. IEEE Transactions on Vehicular Technology 1998; 47(2): 58-64.
-
(1998)
IEEE Transactions on Vehicular Technology
, vol.47
, Issue.2
, pp. 58-64
-
-
Lin, Y.B.1
Tsai, W.N.2
-
20
-
-
0032676481
-
Enhanced privacy and authentication for the global system for mobile communications
-
Lee CH, Hwang M-S, Yang WP. Enhanced privacy and authentication for the global system for mobile communications. Wireless Networks 1999; 5: 231-243.
-
(1999)
Wireless Networks
, vol.5
, pp. 231-243
-
-
Lee, C.H.1
Hwang, M.-S.2
Yang, W.P.3
-
21
-
-
0141741595
-
Signaling system performance evaluation for personal communications
-
Polini GP, Goodman DJ, Signaling system performance evaluation for personal communications. IEEE Communication Magazine 1995; 45(1): 60-65.
-
(1995)
IEEE Communication Magazine
, vol.45
, Issue.1
, pp. 60-65
-
-
Polini, G.P.1
Goodman, D.J.2
-
24
-
-
0028762819
-
-
Molva R, Samfat D, Tsudik G. An authentication protocol for mobile users. IEE Colloguium on Security and Cryptography Applications to Radio System 1994; 4.1-4.7.
-
Molva R, Samfat D, Tsudik G. An authentication protocol for mobile users. IEE Colloguium on Security and Cryptography Applications to Radio System 1994; 4.1-4.7.
-
-
-
-
25
-
-
0345614787
-
An authentication and security protocol for mobile computing
-
Canberra, Australia, pp, September
-
Zheng Y. An authentication and security protocol for mobile computing. Mobile Communication-Technology, Tools. Applications, Authentication and Security (Proceedings of IFIP World Conference on Mobile Communications), Edited by J.L.Encamacao and J.M.Rabaey,Chapman and Hall, Canberra, Australia, pp. 249-257, September 1996.
-
(1996)
Mobile Communication-Technology, Tools. Applications, Authentication and Security (Proceedings of IFIP World Conference on Mobile Communications), Edited by J.L.Encamacao and J.M.Rabaey,Chapman and Hall
, pp. 249-257
-
-
Zheng, Y.1
-
26
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 1978; 21(2): 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
|