-
1
-
-
84893288752
-
Wireless local area network (WLAN) interworking security
-
3GPP
-
3GPP, "Wireless local area network (WLAN) interworking security," 3GPP TS 33.234, 2004.
-
(2004)
3GPP TS 33.234
-
-
-
2
-
-
35649015782
-
Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA)
-
J. Arkko and H. Haverinen, "Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA)," RFC 4187, 2006.
-
(2006)
RFC
, vol.4187
-
-
Arkko, J.1
Haverinen, H.2
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, "Random oracles are practical: a paradigm for designing efficient protocols," in Proc. 1st ACM Conf. Computer Commun. Security, 1993, pp. 62-73.
-
(1993)
Proc. 1st ACM Conf. Computer Commun. Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0027641891
-
Privacy and authentication on a portable communications system
-
Aug.
-
M. J. Beller, L. F. Chang, and Y. Yacobi, "Privacy and authentication on a portable communications system," IEEE J. Sel. Areas Commun., vol. 11, no. 6, pp. 821-829, Aug. 1993.
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, Issue.6
, pp. 821-829
-
-
Beller, M.J.1
Chang, L.F.2
Yacobi, Y.3
-
5
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
6
-
-
0038670954
-
Software implementation of elliptic curve cryptography over binary fields
-
Springer-Verlag
-
D. Hankerson, J. L. Hernandez, and A. Menzes, "Software implementation of elliptic curve cryptography over binary fields," in Proc. CHES 2000, Lecture Notes Comput. Sci. 1965, Springer-Verlag, pp. 1-24, 2000.
-
(2000)
Proc. CHES 2000, Lecture Notes Comput. Sci. 1965
, pp. 1-24
-
-
Hankerson, D.1
Hernandez, J.L.2
Menzes, A.3
-
8
-
-
2542616812
-
Quest for personal control over mobile location privacy
-
Q. He, D. Wu, and P. Khosla, "Quest for personal control over mobile location privacy," IEEE Commun. Mag., vol. 42, no. 5, pp. 130-136, 2004.
-
(2004)
IEEE Commun. Mag.
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
9
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
Mar.
-
K. F. Hwang and C. C. Chang, "A self-encryption mechanism for authentication of roaming and teleconference services," IEEE Trans. Wireless Commun., vol. 2, no. 2, pp. 400-407, Mar. 2003.
-
(2003)
IEEE Trans. Wireless Commun.
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.F.1
Chang, C.C.2
-
10
-
-
50549098698
-
On parallelization of high-speed processors for elliptic curve cryptography
-
Sep.
-
K. Jarrinen and J. Skytta, "On parallelization of high-speed processors for elliptic curve cryptography," IEEE Trans. VLSI Syst., vol. 16, no. 9, pp. 1162-1175, Sep. 2008.
-
(2008)
IEEE Trans. VLSI Syst.
, vol.16
, Issue.9
, pp. 1162-1175
-
-
Jarrinen, K.1
Skytta, J.2
-
11
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
Sep.
-
Y. Jiang, C. Lin, X. Shen, and M. Shi, "Mutual authentication and key exchange protocols for roaming services in wireless mobile networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2569-2576, Sep. 2006.
-
(2006)
IEEE Trans. Wireless Commun.
, vol.5
, Issue.9
, pp. 2569-2576
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
12
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," Int. J. Inf. Security, vol. 1, no. 1, pp. 36-63, 2001.
-
(2001)
Int. J. Inf. Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
13
-
-
0003068282
-
Security architecture for the Internet protocol
-
Nov.
-
S. Kent and R. Atkinson, "Security architecture for the Internet protocol," RFC 2401, Nov. 1998.
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
14
-
-
19944362854
-
A new delegation-based authentication protocol for use in portable communication systems
-
W. B. Lee and C. K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Trans. Wireless Commun., vol. 4, no. 1, pp. 57-64, 2005.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, Issue.1
, pp. 57-64
-
-
Lee, W.B.1
Yeh, C.K.2
-
15
-
-
0032069870
-
On key control in key agreement protocols
-
C. Mitchell, M. Ward, and P. Wilson, "On key control in key agreement protocols," Electron. Lett., vol. 34, pp. 980-981, 1998.
-
(1998)
Electron. Lett.
, vol.34
, pp. 980-981
-
-
Mitchell, C.1
Ward, M.2
Wilson, P.3
-
16
-
-
0028397595
-
Authentication of mobile users
-
R. Molva, D. Samfat, and G. Tsudik, "Authentication of mobile users," IEEE Network, vol. 8, no. 2, pp. 26-34, 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.2
, pp. 26-34
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
17
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B. C. Neuman and T. Tso, "Kerberos: an authentication service for computer networks," IEEE Commun. Mag., vol. 32, no. 9, pp. 33-38, 1994.
-
(1994)
IEEE Commun. Mag.
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Tso, T.2
-
18
-
-
0017930809
-
A method for obtaining digital signature and public-key cryptosystem
-
Feb.
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signature and public-key cryptosystem," Commun. ACM, vol. 21, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
19
-
-
0029451888
-
Untraceability in mobile networks
-
D. Samfat, R. Molva, and N. Asokan, "Untraceability in mobile networks," in Proc. Int. Conf. Mobile Computing Networking, 1995, pp. 26-36.
-
(1995)
Proc. Int. Conf. Mobile Computing Networking
, pp. 26-36
-
-
Samfat, D.1
Molva, R.2
Asokan, N.3
-
20
-
-
58149108946
-
An efficient mobile authentication scheme for wireless networks
-
Apr.
-
C. Tang and D. O. Wu, "An efficient mobile authentication scheme for wireless networks," IEEE Trans. Wireless Commun., vol. 7, no. 4, pp. 1408-1416, Apr. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.4
, pp. 1408-1416
-
-
Tang, C.1
Wu, D.O.2
-
21
-
-
0035135698
-
Authentication of mobile users in the third generation mobile system
-
Jan.
-
Z. J. Tzeng and W. G. Tzeng, "Authentication of mobile users in the third generation mobile system," Wireless Personal Commun., vol. 16, no. 1, pp. 35-50, Jan. 2001.
-
(2001)
Wireless Personal Commun.
, vol.16
, Issue.1
, pp. 35-50
-
-
Tzeng, Z.J.1
Tzeng, W.G.2
-
22
-
-
35449005656
-
Anonymous and authenticated key exchange for roaming networks
-
G. Yang, D. S. Wong, and X. Deng, "Anonymous and authenticated key exchange for roaming networks," IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3461-3472, 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.9
, pp. 3461-3472
-
-
Yang, G.1
Wong, D.S.2
Deng, X.3
-
23
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Com-mun., vol. 4, no. 2, pp. 734-742, 2005.
-
(2005)
IEEE Trans. Wireless Com-mun.
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
|