-
2
-
-
64249116492
-
-
The Monthly Statistics in Communication Industry
-
The Monthly Statistics in Communication Industry, http://www.mii.gov.cn/art/2006/12/22 /art_27_27537.htm.
-
-
-
-
3
-
-
24644522325
-
Secure mobile business applications framework, architecture and implementation
-
Walter T., et al. Secure mobile business applications framework, architecture and implementation. Information Security Technical Report 9, Issue 4 (December 2004) 6-21
-
(2004)
Information Security Technical Report
, vol.9 Issue 4
, pp. 6-21
-
-
Walter, T.1
-
7
-
-
0031234695
-
On certificate-based security protocols for wireless mobile communication systems
-
Park C.S. On certificate-based security protocols for wireless mobile communication systems. IEEE Network 11 5 (1997) 50-55
-
(1997)
IEEE Network
, vol.11
, Issue.5
, pp. 50-55
-
-
Park, C.S.1
-
10
-
-
40949105625
-
A generic authentication system based on SIM
-
Wangensteen A., Lunde L., Jørstad I., and van Do T. A generic authentication system based on SIM. International Conference on Internet Surveillance and Protection, Cap Esterel, French Riviera (August 27-September 2, 2006)
-
(2006)
International Conference on Internet Surveillance and Protection, Cap Esterel, French Riviera
-
-
Wangensteen, A.1
Lunde, L.2
Jørstad, I.3
van Do, T.4
-
11
-
-
9544227377
-
Improvement of Chien et al.'s remote user authentication scheme using smart cards
-
Lee S.-W., Kim H.-S., and Yoo K.-Y. Improvement of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces 27 (2005) 181-183
-
(2005)
Computer Standards & Interfaces
, vol.27
, pp. 181-183
-
-
Lee, S.-W.1
Kim, H.-S.2
Yoo, K.-Y.3
-
12
-
-
0742268499
-
Security of Chien et al.'s remote user authentication scheme using smart cards
-
Hsu C.-L. Security of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces 26 (2004) 167-169
-
(2004)
Computer Standards & Interfaces
, vol.26
, pp. 167-169
-
-
Hsu, C.-L.1
-
13
-
-
0036302680
-
An efficient and practical solution to remote authentication: smart card
-
Chien H.Y., Jan J.K., and Tseng Y.M. An efficient and practical solution to remote authentication: smart card. Computers and Security 21 4 (2002) 372-375
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
14
-
-
27744498991
-
A new efficient authentication protocol for mobile networks
-
Hwang R.-J., and Su F.-F. A new efficient authentication protocol for mobile networks. Computer Standards & Interfaces 28 2 (December 2005) 241-252
-
(2005)
Computer Standards & Interfaces
, vol.28
, Issue.2
, pp. 241-252
-
-
Hwang, R.-J.1
Su, F.-F.2
-
15
-
-
1542335451
-
Efficient password authenticated key agreement using smart cards
-
Juang W.S. Efficient password authenticated key agreement using smart cards. Computers & Security 23 2 (2004) 167-173
-
(2004)
Computers & Security
, vol.23
, Issue.2
, pp. 167-173
-
-
Juang, W.S.1
-
17
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
Sun H.M. An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46 4 (2000) 958961
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 958961
-
-
Sun, H.M.1
-
18
-
-
0037715403
-
A hybrid authentication protocol for large mobile network
-
Chien H.Y., and Jan J.K. A hybrid authentication protocol for large mobile network. The Journal of Systems and Software 67 (2003) 123130
-
(2003)
The Journal of Systems and Software
, vol.67
, pp. 123130
-
-
Chien, H.Y.1
Jan, J.K.2
-
19
-
-
84962060059
-
The logic of authentication protocols
-
Springer-Verlag
-
Syverson P., and Cervesato I. The logic of authentication protocols. LNCS 2171 (2001), Springer-Verlag 63-137
-
(2001)
LNCS
, vol.2171
, pp. 63-137
-
-
Syverson, P.1
Cervesato, I.2
-
20
-
-
0037376798
-
Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration
-
Grecas C.F., Maniatis S.I., and Venieris I.S. Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration. Mobile Networks and Applications 8 2 (2003) 145-150
-
(2003)
Mobile Networks and Applications
, vol.8
, Issue.2
, pp. 145-150
-
-
Grecas, C.F.1
Maniatis, S.I.2
Venieris, I.S.3
-
21
-
-
0347743847
-
The WAP forum's wireless public key infrastructure
-
Farrell S. The WAP forum's wireless public key infrastructure. Information Security Technical Report 5, Issue 3 (September 1 2000) 23-31
-
(2000)
Information Security Technical Report
, vol.5 Issue 3
, pp. 23-31
-
-
Farrell, S.1
-
22
-
-
34247501217
-
Advances in network smart cards authentication
-
Torres J., Izquierdo A., and Sierra J.M. Advances in network smart cards authentication. Computer Networks 51 9 (June 20 2007) 2249-2261
-
(2007)
Computer Networks
, vol.51
, Issue.9
, pp. 2249-2261
-
-
Torres, J.1
Izquierdo, A.2
Sierra, J.M.3
-
23
-
-
4544252848
-
Toward SSL integration in SIM SmartCards
-
0-7803-8345-1 (CD-ROM)
-
Badra M., and Urien P. Toward SSL integration in SIM SmartCards. IEEE Wireless Communications and Networking Conference, IEEE WCNC, Atlanta, GA, USA (2004). 0-7803-8345-1 (CD-ROM)
-
(2004)
IEEE Wireless Communications and Networking Conference, IEEE WCNC, Atlanta, GA, USA
-
-
Badra, M.1
Urien, P.2
-
26
-
-
42249100194
-
Short message service based applications in the GSM network
-
Collesei S., Tria D.P., and Morena G. Short message service based applications in the GSM network. 5th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, The Hague, Netherlands (1994) 939-943
-
(1994)
5th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, The Hague, Netherlands
, pp. 939-943
-
-
Collesei, S.1
Tria, D.P.2
Morena, G.3
-
27
-
-
64249100887
-
-
Mobile Payment Forum, Risks and Threats Analysis and Security Best Practices for Mobile 2-Way Messaging Systems. [Online]. Available: http://www.mobilepaymentforum.org/documents/Risk_and_Threats_Analysis_and_Security_Best_%20Practices_%20Mobile_2_Way_Messaging_December_2002.pdf. Accessed on: 10 November 2007.
-
Mobile Payment Forum, Risks and Threats Analysis and Security Best Practices for Mobile 2-Way Messaging Systems. [Online]. Available: http://www.mobilepaymentforum.org/documents/Risk_and_Threats_Analysis_and_Security_Best_%20Practices_%20Mobile_2_Way_Messaging_December_2002.pdf. Accessed on: 10 November 2007.
-
-
-
-
28
-
-
33845570213
-
-
[Online]. Available: http://cryptome.org/a51-bsw.htm. Accessed on: 13 February 2007
-
Biryukov A., Shamir A., and Wagner D. Real Time Cryptanalysis of A5/1 on a PC (2000). http://cryptome.org/a51-bsw.htm [Online]. Available: http://cryptome.org/a51-bsw.htm. Accessed on: 13 February 2007
-
(2000)
Real Time Cryptanalysis of A5/1 on a PC
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
29
-
-
53049088300
-
SMSSec: An end-to-end protocol for secure SMS
-
in press, doi:10.1016/j.cose.2008.05.003
-
J.L.C. Lo et al., SMSSec: An end-to-end protocol for secure SMS, Comput. Secur. (in press), doi:10.1016/j.cose.2008.05.003.
-
Comput. Secur
-
-
Lo, J.L.C.1
|