-
1
-
-
26444482529
-
32 with applications to MD5
-
New York: Springer-Verlag
-
32 with applications to MD5, Proc. of the EURO-CRYPT'92, New York: Springer-Verlag, 1992.
-
(1992)
Proc. of the EURO-CRYPT'92
-
-
Berson, T.1
-
2
-
-
0001010820
-
Collisions for the compression function of MD5
-
New York: Springer-Verlag
-
B. Boer and A. Bosselaers, Collisions for the compression function of MD5, Proc. of the EURO-CRYPT'93, New York: Springer-Verlag, 1993.
-
(1993)
Proc. of the EURO-CRYPT'93
-
-
Boer, B.1
Bosselaers, A.2
-
3
-
-
0033907037
-
Extensions to an authentication technique proposed for the global mobility network
-
L. Buttyan, C. Gbaguidi, S. Staamann and U. Wilhelm, Extensions to an authentication technique proposed for the global mobility network, IEEE Transactions on Communications, vol.48, no.3, pp.373-376, 2000.
-
(2000)
IEEE Transactions on Communications
, vol.48
, Issue.3
, pp. 373-376
-
-
Buttyan, L.1
Gbaguidi, C.2
Staamann, S.3
Wilhelm, U.4
-
4
-
-
2142759434
-
End-to-end security protocol for mobile communications with end-user identification/authentication
-
C-C. Chang, K.-L. Chen and M.-S. Hwang, End-to-end security protocol for mobile communications with end-user identification/authentication, Wireless Personal Communications, vol.28, no.2, pp.95-106, 2004.
-
(2004)
Wireless Personal Communications
, vol.28
, Issue.2
, pp. 95-106
-
-
Chang, C.-C.1
Chen, K.-L.2
Hwang, M.-S.3
-
5
-
-
47549103010
-
A GA-based nearly optimal image authentication approach
-
C-C. Chen and C.-S. Lin, A GA-based nearly optimal image authentication approach, International Journal of Innovative Computing, Information and Control, vol.3, no.3, pp.631-640, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.3
, pp. 631-640
-
-
Chen, C.-C.1
Lin, C.-S.2
-
6
-
-
84976665942
-
Timestamps in key distribution protocols
-
G. M. Sacco and D. E. Denning, Timestamps in key distribution protocols, Communications of the ACM, vol.24, no.8, pp.533-536, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Sacco, G.M.1
Denning, D.E.2
-
7
-
-
0001849866
-
The status of MD5 after a recent attack
-
H. Dobbertin, The status of MD5 after a recent attack, CryptoBytes, vol.2, no.2, pp.1-6, 1996.
-
(1996)
CryptoBytes
, vol.2
, Issue.2
, pp. 1-6
-
-
Dobbertin, H.1
-
8
-
-
0036349030
-
An effective approach for authentication of mobile users
-
N. El-Fishway, M. Nofal and A. Tadros, An effective approach for authentication of mobile users, Vehicular Technology Conference, Spring 2002, IEEE 55th, vol.2, pp.598-601, 2002.
-
(2002)
Vehicular Technology Conference, Spring 2002, IEEE 55th
, vol.2
, pp. 598-601
-
-
El-Fishway, N.1
Nofal, M.2
Tadros, A.3
-
9
-
-
17644392952
-
Recommendation GSM 03.20: Security related network functions,
-
ETSI, Technical Report, European Telecommunications Standards Institute, June
-
ETSI, Recommendation GSM 03.20: Security related network functions, Technical Report, European Telecommunications Standards Institute, June 1993.
-
(1993)
-
-
-
11
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
K. F. Hwang and C. C. Chang, A self-encryption mechanism for authentication of roaming and teleconference services, IEEE Transactions on Wireless Communications, vol.2, no.2, pp.400-407, 2003.
-
(2003)
IEEE Transactions on Wireless Communications
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.F.1
Chang, C.C.2
-
12
-
-
4544330565
-
Extension of authentication protocol for GSM
-
C-C. Lee, M.-S. Hwang and W.-P. Yang, Extension of authentication protocol for GSM, IEE Proceedings - Communications, vol.150, no.2, pp.91-95, 2003.
-
(2003)
IEE Proceedings - Communications
, vol.150
, Issue.2
, pp. 91-95
-
-
Lee, C.-C.1
Hwang, M.-S.2
Yang, W.-P.3
-
13
-
-
0345306310
-
A new privacy and authentication protocol for end-to-end mobile users
-
C-C Lee, C-C. Yang and M.-S. Hwang, A new privacy and authentication protocol for end-to-end mobile users, International Journal of Communication Systems, vol.6, no.9, pp.799-808, 2003.
-
(2003)
International Journal of Communication Systems
, vol.6
, Issue.9
, pp. 799-808
-
-
Lee, C.-C.1
Yang, C.-C.2
Hwang, M.-S.3
-
14
-
-
0032676481
-
Enhanced privacy and authentication for the global system of mobile communications
-
C.-H. Lee, M.-S. Hwang and W.-P. Yang, Enhanced privacy and authentication for the global system of mobile communications, Wireless Networks, vol.5, pp.231-243, 1999.
-
(1999)
Wireless Networks
, vol.5
, pp. 231-243
-
-
Lee, C.-H.1
Hwang, M.-S.2
Yang, W.-P.3
-
15
-
-
0033332268
-
Secure communication mechanisms for GSM networks
-
C. C. Lo and Y. J. Chen, Secure communication mechanisms for GSM networks, IEEE Transactions on Consumer Electronics, vol.45, no.4, pp.1074-1080, 1999.
-
(1999)
IEEE Transactions on Consumer Electronics
, vol.45
, Issue.4
, pp. 1074-1080
-
-
Lo, C.C.1
Chen, Y.J.2
-
16
-
-
0032183211
-
Adaptive hybrid clock discipline algorithm for the network time protocol
-
D. L. Mills, Adaptive hybrid clock discipline algorithm for the network time protocol, IEEE/ACM Transactions on Networking, vol.6, no.5, pp.1063-6692, 1998.
-
(1998)
IEEE/ACM Transactions on Networking
, vol.6
, Issue.5
, pp. 1063-6692
-
-
Mills, D.L.1
-
17
-
-
0003629991
-
Secure hash standard,
-
NIST, 180-1, NIST, US Department Commerce
-
NIST, Secure hash standard, Technical Report FIPS 180-1, NIST, US Department Commerce, 1995.
-
(1995)
Technical Report FIPS
-
-
-
18
-
-
0003508558
-
Advanced encryption standard,
-
NIST, 197, NIST, US Department Commerce
-
NIST, Advanced encryption standard, Technical Report FIPS 197, NIST, US Department Commerce, 2001.
-
(2001)
Technical Report FIPS
-
-
-
19
-
-
0003602325
-
The MD5 message digest algorithm,
-
1321, IETF
-
R. Rivest, The MD5 message digest algorithm, Technical Report RFC 1321, IETF, 1992.
-
(1992)
Technical Report RFC
-
-
Rivest, R.1
-
20
-
-
0031257939
-
Authentication technique based on distributed security management for the global mobility network
-
S. Suzuki and K. Nakada, Authentication technique based on distributed security management for the global mobility network, IEEE Journal on Selected Areas in Communications, vol.15, no.8, pp.1608-1617, 1997.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzuki, S.1
Nakada, K.2
|