-
1
-
-
0028397595
-
Authentication of mobile users
-
R. Molva, D. Samfat, and G. Tsudik, "Authentication of mobile users", IEEE Network, Special Issue cm Mobile Communications, vol. 8, no. 2, pp. 26-34, 1994.
-
(1994)
IEEE Network, Special Issue cm Mobile Communications
, vol.8
, Issue.2
, pp. 26-34
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
2
-
-
0029451888
-
Untraceability in mobile networks
-
D. Samfat, R. Molva, and N. Asokan, "Untraceability in mobile networks", in Proc. International Conference on Mobile Computing and Networking, 1995, pp. 26-36.
-
(1995)
Proc. International Conference on Mobile Computing and Networking
, pp. 26-36
-
-
Samfat, D.1
Molva, R.2
Asokan, N.3
-
3
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B. C. Neuman and T. Ts'o, "Kerberos: an authentication service for computer networks", IEEE Commun. Mag., vol. 32, no. 9. pp. 33-38, 1994.
-
(1994)
IEEE Commun. Mag
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
4
-
-
0027641891
-
Privacy and authentication on a portable communications system
-
Aug
-
M. J. Beller, L.-F. Chang, and Y. Yacobi, "Privacy and authentication on a portable communications system", IEEE J. Select. Areas Commun., vol. 11, no. 6, pp. 821-829, Aug. 1993.
-
(1993)
IEEE J. Select. Areas Commun
, vol.11
, Issue.6
, pp. 821-829
-
-
Beller, M.J.1
Chang, L.-F.2
Yacobi, Y.3
-
5
-
-
2542616812
-
Quest for personal control over mobile location privacy
-
Q. He, D. Wu, and P. Khosla, "Quest for personal control over mobile location privacy", IEEE Commun. Mag., vol. 42, no. 5, pp. 130-136, 2004.
-
(2004)
IEEE Commun. Mag
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
6
-
-
19944362854
-
A new delegation-based authentication protocol for use in portable communication systems
-
W.-B. Lee and C.-K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems", IEEE Trans. Wireless Commun., vol. 4, no. 1, pp. 57-64, 2005.
-
(2005)
IEEE Trans. Wireless Commun
, vol.4
, Issue.1
, pp. 57-64
-
-
Lee, W.-B.1
Yeh, C.-K.2
-
7
-
-
0019634370
-
Password authentication with insecure communication
-
Nov
-
L. Lamport, "Password authentication with insecure communication", Commun. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
8
-
-
0016092372
-
A user authentication scheme not requiring secrecy in the computer
-
Aug
-
A. Evans, W. Kantrowitz, and W. Weiss, "A user authentication scheme not requiring secrecy in the computer", Commun. ACM, vol. 17, no. 8, pp. 437-442, Aug. 1974.
-
(1974)
Commun. ACM
, vol.17
, Issue.8
, pp. 437-442
-
-
Evans, A.1
Kantrowitz, W.2
Weiss, W.3
-
9
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures for delegating signing operation", in Proc. 3rd ACM CCS, 1996, pp. 48-57.
-
(1996)
Proc. 3rd ACM CCS
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
10
-
-
84957014368
-
Discrete logarithm in finite fields and their cryptographic significance
-
Spinger-Verlag
-
A. M. Odlyzko, "Discrete logarithm in finite fields and their cryptographic significance", in Proc. Eurocrypt. Spinger-Verlag, 1985, pp. 224-314.
-
(1985)
Proc. Eurocrypt
, pp. 224-314
-
-
Odlyzko, A.M.1
-
11
-
-
84948137719
-
Extended proxy signature for smart card
-
Spinger-Verlag
-
T. Okamoto, M. Tada, and E. Okamoto, "Extended proxy signature for smart card", in LNCS 1729. Spinger-Verlag, 1999, pp. 247-258.
-
(1999)
LNCS
, vol.1729
, pp. 247-258
-
-
Okamoto, T.1
Tada, M.2
Okamoto, E.3
-
12
-
-
84958751721
-
Secure mobile agent using strong nondesignated proxy signature
-
Springer-Verlag
-
B. Lee, H. Kim, and K. Kim, "Secure mobile agent using strong nondesignated proxy signature", in LNCS 2119). Springer-Verlag, 2001, pp. 474-486.
-
(2001)
LNCS
, vol.2119
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
13
-
-
35048825374
-
Security analysis of some proxy signatures
-
Springer-Verlag
-
G. Wang, F. Bao, J. Zhou, and R. H. Deng, "Security analysis of some proxy signatures", in Proc. Information Security and Cryptology (LNCS 2971). Springer-Verlag, 2004, pp. 305-319.
-
(2004)
Proc. Information Security and Cryptology (LNCS 2971)
, pp. 305-319
-
-
Wang, G.1
Bao, F.2
Zhou, J.3
Deng, R.H.4
-
15
-
-
0010029876
-
Efficient arithmetic on koblitz curves
-
J. A. Solinas, "Efficient arithmetic on koblitz curves", Designs, Codes and Cryptography, vol. 19, no. 2, pp. 195-249, 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, Issue.2
, pp. 195-249
-
-
Solinas, J.A.1
-
16
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
Mar
-
M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol", IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 734-742, Mar. 2005.
-
(2005)
IEEE Trans. Wireless Commun
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
-
17
-
-
58149115768
-
Security architecture, version 4.2.0, release 4. Third Generation Partnership Project - Technical Specification Group
-
TS 33.102
-
(2001) TS 33.102: Security architecture, version 4.2.0, release 4. Third Generation Partnership Project - Technical Specification Group.
-
-
-
-
18
-
-
58149104605
-
-
TR 33.902: Formal analysis of the 3g authentication protocol. Third Generation Partnership Project - Authentication and Key Agreement (AKA).
-
(2000) TR 33.902: Formal analysis of the 3g authentication protocol. Third Generation Partnership Project - Authentication and Key Agreement (AKA).
-
-
-
-
19
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)", International J. Inform. Security, vol. 1, no. 1, pp. 36-63. 2001.
-
(2001)
International J. Inform. Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
20
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Dec
-
R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers", Commun. ACM, vol. 21, no. 12, pp. 993-999, Dec. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
21
-
-
0029224504
-
On travelling incognito
-
A. Herzberg, H. Krawczyk, and G. Tsudik, "On travelling incognito", in Proc. IEEE Workshop on Mobile Systems and Applications, 1994, pp. 205-211.
-
(1994)
Proc. IEEE Workshop on Mobile Systems and Applications
, pp. 205-211
-
-
Herzberg, A.1
Krawczyk, H.2
Tsudik, G.3
-
23
-
-
84976665942
-
Timestamps in key distribution protocols
-
Aug
-
D. E. Denning and G. M. Sacco, "Timestamps in key distribution protocols", Commun. ACM, vol. 24, no. 8, pp. 533-536, Aug. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
25
-
-
0000874415
-
Limitations of the Kerberos authentication system
-
Oct
-
S. M. Bellovin and M. Merritt, "Limitations of the Kerberos authentication system", ACM Comput. Commun. Review, vol. 20, no. 5, pp. 119-132, Oct. 1990.
-
(1990)
ACM Comput. Commun. Review
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.M.1
Merritt, M.2
-
26
-
-
0038670954
-
Software implementation of elliptic curve cryptography over binary fields
-
Springer-Verlag
-
D. Hankerson, J. L. Hernandez, and A. Menezes, "Software implementation of elliptic curve cryptography over binary fields", in Proc. CHES 2000 (LNCS 1965). Springer-Verlag, 2000, pp. 1-24.
-
(2000)
Proc. CHES 2000 (LNCS 1965)
, pp. 1-24
-
-
Hankerson, D.1
Hernandez, J.L.2
Menezes, A.3
|