메뉴 건너뛰기




Volumn 4, Issue 8, 2008, Pages 2045-2056

A key management for wireless communications

Author keywords

Authentication; GSM; One way hash function; Wireless communications

Indexed keywords


EID: 63649111988     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (22)

References (20)
  • 1
    • 26444482529 scopus 로고
    • 32 with applications to MD5
    • New York: Springer-Verlag
    • 32 with applications to MD5, Proc. of the EURO-CRYPT'92, New York: Springer-Verlag, 1992.
    • (1992) Proc. of the EURO-CRYPT'92
    • Berson, T.1
  • 2
    • 0001010820 scopus 로고
    • Collisions for the compression function of MD5
    • New York: Springer-Verlag
    • B. Boer and A. Bosselaers, Collisions for the compression function of MD5, Proc. of the EURO-CRYPT'93, New York: Springer-Verlag, 1993.
    • (1993) Proc. of the EURO-CRYPT'93
    • Boer, B.1    Bosselaers, A.2
  • 3
    • 0033907037 scopus 로고    scopus 로고
    • Extensions to an authentication technique proposed for the global mobility network
    • L. Buttyan, C. Gbaguidi, S. Staamann and U. Wilhelm, Extensions to an authentication technique proposed for the global mobility network, IEEE Transactions on Communications, vol.48, no.3, pp.373-376, 2000.
    • (2000) IEEE Transactions on Communications , vol.48 , Issue.3 , pp. 373-376
    • Buttyan, L.1    Gbaguidi, C.2    Staamann, S.3    Wilhelm, U.4
  • 4
    • 2142759434 scopus 로고    scopus 로고
    • End-to-end security protocol for mobile communications with end-user identification/authentication
    • C-C. Chang, K.-L. Chen and M.-S. Hwang, End-to-end security protocol for mobile communications with end-user identification/authentication, Wireless Personal Communications, vol.28, no.2, pp.95-106, 2004.
    • (2004) Wireless Personal Communications , vol.28 , Issue.2 , pp. 95-106
    • Chang, C.-C.1    Chen, K.-L.2    Hwang, M.-S.3
  • 6
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • G. M. Sacco and D. E. Denning, Timestamps in key distribution protocols, Communications of the ACM, vol.24, no.8, pp.533-536, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Sacco, G.M.1    Denning, D.E.2
  • 7
    • 0001849866 scopus 로고    scopus 로고
    • The status of MD5 after a recent attack
    • H. Dobbertin, The status of MD5 after a recent attack, CryptoBytes, vol.2, no.2, pp.1-6, 1996.
    • (1996) CryptoBytes , vol.2 , Issue.2 , pp. 1-6
    • Dobbertin, H.1
  • 9
    • 17644392952 scopus 로고
    • Recommendation GSM 03.20: Security related network functions,
    • ETSI, Technical Report, European Telecommunications Standards Institute, June
    • ETSI, Recommendation GSM 03.20: Security related network functions, Technical Report, European Telecommunications Standards Institute, June 1993.
    • (1993)
  • 11
    • 3042783229 scopus 로고    scopus 로고
    • A self-encryption mechanism for authentication of roaming and teleconference services
    • K. F. Hwang and C. C. Chang, A self-encryption mechanism for authentication of roaming and teleconference services, IEEE Transactions on Wireless Communications, vol.2, no.2, pp.400-407, 2003.
    • (2003) IEEE Transactions on Wireless Communications , vol.2 , Issue.2 , pp. 400-407
    • Hwang, K.F.1    Chang, C.C.2
  • 14
    • 0032676481 scopus 로고    scopus 로고
    • Enhanced privacy and authentication for the global system of mobile communications
    • C.-H. Lee, M.-S. Hwang and W.-P. Yang, Enhanced privacy and authentication for the global system of mobile communications, Wireless Networks, vol.5, pp.231-243, 1999.
    • (1999) Wireless Networks , vol.5 , pp. 231-243
    • Lee, C.-H.1    Hwang, M.-S.2    Yang, W.-P.3
  • 15
    • 0033332268 scopus 로고    scopus 로고
    • Secure communication mechanisms for GSM networks
    • C. C. Lo and Y. J. Chen, Secure communication mechanisms for GSM networks, IEEE Transactions on Consumer Electronics, vol.45, no.4, pp.1074-1080, 1999.
    • (1999) IEEE Transactions on Consumer Electronics , vol.45 , Issue.4 , pp. 1074-1080
    • Lo, C.C.1    Chen, Y.J.2
  • 16
    • 0032183211 scopus 로고    scopus 로고
    • Adaptive hybrid clock discipline algorithm for the network time protocol
    • D. L. Mills, Adaptive hybrid clock discipline algorithm for the network time protocol, IEEE/ACM Transactions on Networking, vol.6, no.5, pp.1063-6692, 1998.
    • (1998) IEEE/ACM Transactions on Networking , vol.6 , Issue.5 , pp. 1063-6692
    • Mills, D.L.1
  • 17
    • 0003629991 scopus 로고
    • Secure hash standard,
    • NIST, 180-1, NIST, US Department Commerce
    • NIST, Secure hash standard, Technical Report FIPS 180-1, NIST, US Department Commerce, 1995.
    • (1995) Technical Report FIPS
  • 18
    • 0003508558 scopus 로고    scopus 로고
    • Advanced encryption standard,
    • NIST, 197, NIST, US Department Commerce
    • NIST, Advanced encryption standard, Technical Report FIPS 197, NIST, US Department Commerce, 2001.
    • (2001) Technical Report FIPS
  • 19
    • 0003602325 scopus 로고
    • The MD5 message digest algorithm,
    • 1321, IETF
    • R. Rivest, The MD5 message digest algorithm, Technical Report RFC 1321, IETF, 1992.
    • (1992) Technical Report RFC
    • Rivest, R.1
  • 20
    • 0031257939 scopus 로고    scopus 로고
    • Authentication technique based on distributed security management for the global mobility network
    • S. Suzuki and K. Nakada, Authentication technique based on distributed security management for the global mobility network, IEEE Journal on Selected Areas in Communications, vol.15, no.8, pp.1608-1617, 1997.
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.8 , pp. 1608-1617
    • Suzuki, S.1    Nakada, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.