-
1
-
-
0031257939
-
An authentication technique based on distributed security management for the global mobility network
-
Suzukiz S., and Nakada K. An authentication technique based on distributed security management for the global mobility network. IEEE Journal Selected Areas in Communications 15 8 (1997) 1608-1617
-
(1997)
IEEE Journal Selected Areas in Communications
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzukiz, S.1
Nakada, K.2
-
2
-
-
0033907037
-
Extensions to an authentication technique proposed for the global mobility network
-
Buttyan L., Gbaguidi C., Staamann S., and Wilhelm U. Extensions to an authentication technique proposed for the global mobility network. IEEE Transactions on Communications 48 3 (2000) 373-376
-
(2000)
IEEE Transactions on Communications
, vol.48
, Issue.3
, pp. 373-376
-
-
Buttyan, L.1
Gbaguidi, C.2
Staamann, S.3
Wilhelm, U.4
-
3
-
-
0035135698
-
Authentication of mobile users in third generation mobile system
-
Tzeng Z.J., and Tzeng W.G. Authentication of mobile users in third generation mobile system. Wireless Personal Communications 16 1 (2001) 35-50
-
(2001)
Wireless Personal Communications
, vol.16
, Issue.1
, pp. 35-50
-
-
Tzeng, Z.J.1
Tzeng, W.G.2
-
4
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
Hwang K.F., and Chang C.C. A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Transactions on Wireless Communications 2 2 (2003) 400-407
-
(2003)
IEEE Transactions on Wireless Communications
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.F.1
Chang, C.C.2
-
5
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Zhu J., and Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50 1 (2004) 230-234
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
-
6
-
-
33947106463
-
Cryptanalysis of a new authentication scheme with anonymity for wireless environments
-
Bali, Indonesia
-
C.H. Lin, C.Y. Lee, Cryptanalysis of a new authentication scheme with anonymity for wireless environments, in: Proceedings of the Second International Conference on Advances in Mobile Multimedia, Bali, Indonesia, 2004, pp. 399-402.
-
(2004)
Proceedings of the Second International Conference on Advances in Mobile Multimedia
, pp. 399-402
-
-
Lin, C.H.1
Lee, C.Y.2
-
7
-
-
33947102781
-
-
C.Y. Lee, C.C. Chang, C.H. Lin, User authentication with anonymity for global mobility networks, in: Proceedings of IEE Mobility Conference 2005: The Second Asia Pacific Conference on Mobile Technology, Applications and Systems, Guangzhou, China, 2005, pp. 3-1B-6:1-5.
-
C.Y. Lee, C.C. Chang, C.H. Lin, User authentication with anonymity for global mobility networks, in: Proceedings of IEE Mobility Conference 2005: The Second Asia Pacific Conference on Mobile Technology, Applications and Systems, Guangzhou, China, 2005, pp. 3-1B-6:1-5.
-
-
-
-
8
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee C.C., Hwang M.S., and Liao I.E. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53 5 (2006) 1683-1687
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
11
-
-
0003629990
-
-
National Institute of Standards and Technology, U.S. Department of Commerce, U.S. Federal Information Processing Standard Publication 180-2
-
National Institute of Standards and Technology, U.S. Department of Commerce, "Secure Hash Standard," U.S. Federal Information Processing Standard Publication 180-2, 2002.
-
(2002)
Secure Hash Standard
-
-
-
13
-
-
0003508558
-
-
National Institute of Standards and Technology, U.S. Department of Commerce, U.S. Federal Information Processing Standard Publication 197
-
National Institute of Standards and Technology, U.S. Department of Commerce, "Advanced Encryption Standard," U.S. Federal Information Processing Standard Publication 197, 2001.
-
(2001)
Advanced Encryption Standard
-
-
-
14
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R.L., Shamir A., and Adleman L.M. A method for obtaining digital signatures and public-key cryptosystems. Communications of ACM 21 2 (1978) 120-126
-
(1978)
Communications of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
15
-
-
84949187399
-
The performance measurement of cryptographic primitives on palm devices
-
New Orleans, USA
-
D.S. Wong, H.H. Fuentes, A.H. Chan, The performance measurement of cryptographic primitives on palm devices, in: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), New Orleans, USA, 2001, pp. 92-101.
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC
, pp. 92-101
-
-
Wong, D.S.1
Fuentes, H.H.2
Chan, A.H.3
-
16
-
-
18844403113
-
Performance analysis of cryptographic protocols on handheld devices
-
Cambridge, USA, Sep
-
P.G. Argyroudis, R. Verma, H. Tewari, D. O'Mahony, Performance analysis of cryptographic protocols on handheld devices, in: Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), Cambridge, USA, Sep. 2004, pp. 169-174.
-
(2004)
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA
, pp. 169-174
-
-
Argyroudis, P.G.1
Verma, R.2
Tewari, H.3
O'Mahony, D.4
-
17
-
-
39049158752
-
Experimental performance evaluation of cryptographic algorithms
-
Vancouver, Canada
-
M. Passing, F. Dressler, Experimental performance evaluation of cryptographic algorithms, in: Proceedings of the 3rd IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), Vancouver, Canada, 2006, pp. 882-887.
-
(2006)
Proceedings of the 3rd IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS)
, pp. 882-887
-
-
Passing, M.1
Dressler, F.2
-
18
-
-
46149119679
-
Practical evaluation of the performance impact of security mechanisms in sensor networks
-
Tampa, USA
-
M. Passing, F. Dressler, Practical evaluation of the performance impact of security mechanisms in sensor networks, in: Proceedings of the 31st IEEE Conference on Local Computer Networks, Tampa, USA, 2006, pp. 623-629.
-
(2006)
Proceedings of the 31st IEEE Conference on Local Computer Networks
, pp. 623-629
-
-
Passing, M.1
Dressler, F.2
-
19
-
-
48749109633
-
Energy consumption and computational analysis of Rijndael-AES
-
Uzbekistan
-
M.R. Doomun, K.S. Soyjaudah, D. Bundhoo, Energy consumption and computational analysis of Rijndael-AES, in: Proceedings of the Third IEEE International Conference in Central Asia on Internet the Next Generation of Mobile, Wireless and Optical Communications Networks (ICI 2007), Uzbekistan, 2007, pp. 1-6.
-
(2007)
Proceedings of the Third IEEE International Conference in Central Asia on Internet the Next Generation of Mobile, Wireless and Optical Communications Networks (ICI
, pp. 1-6
-
-
Doomun, M.R.1
Soyjaudah, K.S.2
Bundhoo, D.3
-
20
-
-
0004116989
-
-
The MIT Press, Cambridge, MA, USA
-
Cormen T.H., Leiserson C.E., Rivest R.L., and Stein C. Introduction to Algorithms. second ed. (2001), The MIT Press, Cambridge, MA, USA
-
(2001)
Introduction to Algorithms. second ed.
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
21
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
Potlapally N.R., Ravi S., Raghunathan A., and Jha N.K. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing 5 2 (2006) 128-143
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
|