-
1
-
-
0032678890
-
Security and authentication in PCS
-
H.-Y. Lin, "Security and authentication in PCS," Comput. Elect. Eng., vol. 25, no. 4, pp. 225-248, 1999.
-
(1999)
Comput. Elect. Eng
, vol.25
, Issue.4
, pp. 225-248
-
-
Lin, H.-Y.1
-
2
-
-
0032124041
-
Mobility and security management in the GSM system and some proposed future improvements
-
July
-
A. Merotra and L. Golding, "Mobility and security management in the GSM system and some proposed future improvements," Proc. IEEE, vol. 86, pp. 1480-1496, July 1998.
-
(1998)
Proc. IEEE
, vol.86
, pp. 1480-1496
-
-
Merotra, A.1
Golding, L.2
-
3
-
-
7244236291
-
Localised authentication for internetwork roaming across wireless LANs
-
Oct
-
M. Long, C.-H. Wu, and J. D. Irwin, "Localised authentication for internetwork roaming across wireless LANs," IEE Proc. Commun., vol. 151, no. 5, pp. 496-500, Oct. 2004.
-
(2004)
IEE Proc. Commun
, vol.151
, Issue.5
, pp. 496-500
-
-
Long, M.1
Wu, C.-H.2
Irwin, J.D.3
-
4
-
-
28544452660
-
Private authentication techniques for the global mobility network
-
Dec
-
T.-F. Lee, C.-C. Chang, and T. Hwang, "Private authentication techniques for the global mobility network," Wireless Personal Commun., vol. 35, no. 4, pp. 329-336, Dec. 2005
-
(2005)
Wireless Personal Commun
, vol.35
, Issue.4
, pp. 329-336
-
-
Lee, T.-F.1
Chang, C.-C.2
Hwang, T.3
-
5
-
-
19944362854
-
A new delegation-based authentication protocol for use in portable communication systems
-
Jan
-
W.-B. Lee and C.-K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Trans. Wireless Commun., vol. 4, no. 1, pp. 57-64, Jan. 2005
-
(2005)
IEEE Trans. Wireless Commun
, vol.4
, Issue.1
, pp. 57-64
-
-
Lee, W.-B.1
Yeh, C.-K.2
-
6
-
-
84944291851
-
Overview of the GSM system and protocol architecture
-
Apr
-
M. Rahnema, "Overview of the GSM system and protocol architecture," IEEE Commun. Mag., pp. 92-100, Apr. 1993.
-
(1993)
IEEE Commun. Mag
, pp. 92-100
-
-
Rahnema, M.1
-
7
-
-
0032312372
-
A new authentication protocol for GSM networks
-
K. Al-Tawill, A. Akrami, and H. Youssef, "A new authentication protocol for GSM networks," in Proc. 23rd Annual IEEE Conf. Local Comput. Networks, pp. 21-30, 1998.
-
(1998)
Proc. 23rd Annual IEEE Conf. Local Comput. Networks
, pp. 21-30
-
-
Al-Tawill, K.1
Akrami, A.2
Youssef, H.3
-
8
-
-
0033364756
-
Authentication protocols with non-repudiation services in personnel communication systems
-
Aug
-
H.-Y. Lin and L. Harn, "Authentication protocols with non-repudiation services in personnel communication systems," IEEE Commun. Lett., vol. 3, no. 8, pp. 236-238, Aug. 1999.
-
(1999)
IEEE Commun. Lett
, vol.3
, Issue.8
, pp. 236-238
-
-
Lin, H.-Y.1
Harn, L.2
-
9
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Commun. of ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Commun. of ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
10
-
-
0005314429
-
The state of cryptographic hash functions
-
Lectures on Data Security: Modern Cryptology in Theory and Practice, Berlin: Springer, pp
-
B. Preneel, "The state of cryptographic hash functions," in Lectures on Data Security: Modern Cryptology in Theory and Practice, LNCS 1561. Berlin: Springer, pp. 158-192, 1999
-
(1999)
LNCS
, vol.1561
, pp. 158-192
-
-
Preneel, B.1
-
11
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
Mar
-
M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Com-mun., vol. 4, pp. 734-742, Mar. 2005.
-
(2005)
IEEE Trans. Wireless Com-mun
, vol.4
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
|