-
5
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
Jan
-
M. Abadi, and R. Needham, "Prudent engineering practice for cryptographic protocols," IEEE Transactions on Software Engineering, vol. 22, no. 1, pp. 6-15, Jan. 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
8
-
-
0041486245
-
Systematic design of two-party authentication protocols
-
Aug
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung, "Systematic design of two-party authentication protocols," in Proceedings of Crypto'91, pp. 44-61, Aug. 1991.
-
(1991)
Proceedings of Crypto'91
, pp. 44-61
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
9
-
-
84874730829
-
An efficient authentication scheme between MANET and WLAN based on mobile IPv6
-
July
-
C. W. Chen, M. C. Chuang, and C. S. Tsai, "An efficient authentication scheme between MANET and WLAN based on mobile IPv6," International Journal of Network Security, vol. 1, no. 1, pp. 14-23, July 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.1
, pp. 14-23
-
-
Chen, C.W.1
Chuang, M.C.2
Tsai, C.S.3
-
11
-
-
84861241320
-
-
W. Dai, Crypto++ Library 5.1. (http://www.eskimo.com/weidai/cryptlib.html) [12] T. Dierks and C. Allen, The TLS Protocol Version 1.0, RFC 2246, Jan. 1999.
-
Crypto++ Library 5.1
-
-
Dai, W.1
-
13
-
-
11244250732
-
Secure universal mobility for wireless Internet
-
Oct
-
A. Dutta, T. Zhang, S. Madhani, K. Taniuchi, K. Fujimoto, Y. Katsube, Y. Ohba, and H. Schulzrinne,"Secure universal mobility for wireless Internet," in Proceedings of ACM 2nd International Workshop onWireless Mobile Applications and Services on WLAN Hotspots, pp. 71-80, Oct. 2004.
-
(2004)
Proceedings of ACM 2nd International Workshop onWireless Mobile Applications and Services on WLAN Hotspots
, pp. 71-80
-
-
Dutta, A.1
Zhang, T.2
Madhani, S.3
Taniuchi, K.4
Fujimoto, K.5
Katsube, Y.6
Ohba, Y.7
Schulzrinne, H.8
-
14
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
K. Hwang and C. Chang, "A self-encryption mechanism for authentication of roaming and teleconference services," IEEE Transactions on Wireless Communications, vol. 2, no. 2, pp. 400-407, 2003.
-
(2003)
IEEE Transactions on Wireless Communications
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.1
Chang, C.2
-
16
-
-
7244249918
-
Advanced SSL/TLS-based authentication for secureWLAN-3G interworking
-
Oct
-
G. Kambourakis, A. Rouskas, G. Kormentzas, and S. Gritzalis, "Advanced SSL/TLS-based authentication for secureWLAN-3G interworking," IEE Proceedings of Communications, vol. 151, no. 5, pp. 501-506, Oct. 2004.
-
(2004)
IEE Proceedings of Communications
, vol.151
, Issue.5
, pp. 501-506
-
-
Kambourakis, G.1
Rouskas, A.2
Kormentzas, G.3
Gritzalis, S.4
-
17
-
-
0036282229
-
Minimizing energy consumption of secure wireless session with QoS con straints
-
R. Karri and P. Mishra, "Minimizing energy consumption of secure wireless session with QoS con straints," in Proceedings of IEEE ICC'02, vol. 4, pp. 2053-2057, 2002.
-
(2002)
Proceedings of IEEE ICC'02
, vol.4
, pp. 2053-2057
-
-
Karri, R.1
Mishra, P.2
-
19
-
-
0242527195
-
Security aspects of 3GWLAN interworking
-
Nov
-
G. Koien and T. Haslestad, "Security aspects of 3GWLAN interworking," IEEE Communications Magazine, vol. 41, no. 11, pp. 82-88, Nov. 2003.
-
(2003)
IEEE Communications Magazine
, vol.41
, Issue.11
, pp. 82-88
-
-
Koien, G.1
Haslestad, T.2
-
20
-
-
3042836953
-
Reducing authentication signaling traffic in third-generation mobile network
-
Y. B. Lin and Y. K. Chen, "Reducing authentication signaling traffic in third-generation mobile network," IEEE Transactions on Wireless Communications, vol. 2, no. 3, pp. 493-501, 2003.
-
(2003)
IEEE Transactions on Wireless Communications
, vol.2
, Issue.3
, pp. 493-501
-
-
Lin, Y.B.1
Chen, Y.K.2
-
21
-
-
4544224325
-
Localized authentication for wireless LAN inter-network roaming
-
Mar
-
M. Long, C. H. Wu, and J. D. Irwin, "Localized authentication for wireless LAN inter-network roaming," in Proceedings of IEEE Wireless Communications and Networking (WCNC'04), pp. 264-267,Mar. 2004.
-
(2004)
Proceedings of IEEE Wireless Communications and Networking (WCNC'04)
, pp. 264-267
-
-
Long, M.1
Wu, C.H.2
Irwin, J.D.3
-
22
-
-
1642412044
-
Secure authentication system for public WLAN roaming
-
Sep
-
Y. Matsunaga, A. Merino, T. Suzuki, and R. Katz, "Secure authentication system for public WLAN roaming," in Proceedings of ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, pp. 113-121, Sep. 2003.
-
(2003)
Proceedings of ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots
, pp. 113-121
-
-
Matsunaga, Y.1
Merino, A.2
Suzuki, T.3
Katz, R.4
-
24
-
-
2942657181
-
A secure context transfer scheme for integration of UMTS and 802.11 WLANs
-
Mar
-
Y. C. Ouyang and C. H. Chu, "A secure context transfer scheme for integration of UMTS and 802.11 WLANs," in Proceedings of 2004 IEEE International Conference on Networking, Sensing and Control, vol. 1, pp. 559-564, Mar. 2004.
-
(2004)
Proceedings of 2004 IEEE International Conference on Networking, Sensing and Control
, vol.1
, pp. 559-564
-
-
Ouyang, Y.C.1
Chu, C.H.2
-
25
-
-
1542269608
-
Analyzing the energy consumption of security protocols
-
N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha, "Analyzing the energy consumption of security protocols," in Proceedings of ACM International Symposium on Low Power Electronics and Design, pp. 30-35, 2003.
-
(2003)
Proceedings of ACM International Symposium on Low Power Electronics and Design
, pp. 30-35
-
-
Potlapally, N.1
Ravi, S.2
Raghunathan, A.3
Jha, N.4
-
27
-
-
0031257939
-
An authentication technique based on distributed security management for the global mobility network
-
S. Suzuki and K. Nakada, "An authentication technique based on distributed security management for the global mobility network," IEEE Journal of Selected Areas in Communications, vol. 15, no. 8, pp. 1608-1617, 1997.
-
(1997)
IEEE Journal of Selected Areas in Communications
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzuki, S.1
Nakada, K.2
-
28
-
-
0036817553
-
WLAN-GPRS integration for next-generation mobile data networks
-
Oct
-
A. K. Salkintzis, C. Fors, and R. Pazhyannur, "WLAN-GPRS integration for next-generation mobile data networks," IEEE Wireless Communications, pp. 112-124, Oct. 2002
-
(2002)
IEEE Wireless Communications
, pp. 112-124
-
-
Salkintzis, A.K.1
Fors, C.2
Pazhyannur, R.3
-
29
-
-
9144267125
-
Authentication and billing protocols for the integration of WLAN and 3G networks
-
June
-
Y. M. Tseng, C. C. Yang, and J. H. Su, "Authentication and billing protocols for the integration of WLAN and 3G networks," Wireless Personal Communications, vol. 29, pp. 351-366, June 2004.
-
(2004)
Wireless Personal Communications
, vol.29
, pp. 351-366
-
-
Tseng, Y.M.1
Yang, C.C.2
Su, J.H.3
-
30
-
-
38949109960
-
3G and WLAN interworking security: current status and key issues
-
Jan
-
C. C. Yang, K. H. Chu, and Y. W. Yang, "3G and WLAN interworking security: current status and key issues," International Journal of Network Security, vol. 2, no. 1, pp. 1-13, Jan. 2006.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.1
, pp. 1-13
-
-
Yang, C.C.1
Chu, K.H.2
Yang, Y.W.3
|