-
2
-
-
47649105900
-
Mutual authentication and key agreement based on elliptic curve cryptography for GSM
-
Dec. 2006
-
Ammayappan, K., Saxena, A., & Negi, A. (2006). Mutual authentication and key agreement based on elliptic curve cryptography for GSM. In International conference on advanced computing and communications, 2006 (pp. 183-186), Dec. 2006.
-
(2006)
International conference on advanced computing and communications
, vol.2006
, pp. 183-186
-
-
Ammayappan, K.1
Saxena, A.2
Negi, A.3
-
3
-
-
17644390205
-
Efficient authentication protocols of GSM
-
Chang, C. C., Lee, J. S., & Chang, Y. F. (2005). Efficient authentication protocols of GSM. Computer Communications, 28, 921-928.
-
(2005)
Computer Communications
, vol.28
, pp. 921-928
-
-
Chang, C.C.1
Lee, J.S.2
Chang, Y.F.3
-
4
-
-
70350217693
-
Cryptanalysis of Parka's authentication protocol in wireless mobile communication systems
-
Dominguez, A. P. (2006). Cryptanalysis of Parka's authentication protocol in wireless mobile communication systems. International Journal of Network Security, 3(3), 279-282.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.3
, pp. 279-282
-
-
Dominguez, A.P.1
-
5
-
-
79951810227
-
-
ETSI Recommendation GSM 02.09: Security related network functions. Tech. rep., European Telecommunications Standards Institute, ETSI, June 1993
-
ETSI (1993). Recommendation GSM 02.09: Security related network functions. Tech. rep., European Telecommunications Standards Institute, ETSI, June 1993.
-
(1993)
-
-
-
6
-
-
79951809650
-
-
ETSI Recommendation GSM 03.20: Security related network functions. Tech. rep., European Telecommunications Standards Institute, ETSI, June 1993
-
ETSI (1993). Recommendation GSM 03.20: Security related network functions. Tech. rep., European Telecommunications Standards Institute, ETSI, June 1993.
-
(1993)
-
-
-
7
-
-
67650339498
-
Detecting scanners: Empirical assessment on a 3G network
-
Falletta, V., & Ricciato, F. (2009). Detecting scanners: Empirical assessment on a 3G network. International Journal of Network Security, 9(2), 143-155.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.2
, pp. 143-155
-
-
Falletta, V.1
Ricciato, F.2
-
8
-
-
70350238517
-
A new mutual authentication protocol for GSM networks
-
May 2009
-
Fanian, A., Berenjkoub, M., & Gulliver, T. A. (2009). A new mutual authentication protocol for GSM networks. In Canadian conference on electrical and computer engineering (pp. 798-803), May 2009.
-
(2009)
Canadian Conference on Electrical and Computer Engineering
, pp. 798-803
-
-
Fanian, A.1
Berenjkoub, M.2
Gulliver, T.A.3
-
9
-
-
35048888160
-
Design and analysis of improved gsm authentication protocol for roaming users
-
Hahn, G., Kwon, T., Kim, S., & Song, J. (2004). Design and analysis of improved GSM authentication protocol for roaming users. In Lecture notes of computer science (vol. 3222, pp. 451-458). (Pubitemid 39746671)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3222
, pp. 451-458
-
-
Hahn, G.1
Kwon, T.2
Kim, S.3
Song, J.4
-
11
-
-
0033343111
-
Dynamic participation in a secure conference scheme for mobile communications
-
DOI 10.1109/25.790522
-
Hwang, M.-S. (1999). Dynamic participation in a secure conference scheme for mobile communications. IEEE Transactions on Vehicular Technology, 48(5), 1469-1474. (Pubitemid 30503764)
-
(1999)
IEEE Transactions on Vehicular Technology
, vol.48
, Issue.5
, pp. 1469-1474
-
-
Hwang, M.-S.1
-
12
-
-
3142712426
-
A new anonymous channel protocol in wireless communications
-
Hwang, M.-S., Lee, C.-C., & Lee, J.-Z. (2004). A new anonymous channel protocol in wireless communications. International Journal on Electronics and Communications, 58(3), 218-222.
-
(2004)
International Journal on Electronics and Communications
, vol.58
, Issue.3
, pp. 218-222
-
-
Hwang, M.-S.1
Lee, C.-C.2
Lee, J.-Z.3
-
13
-
-
23744437250
-
A secure protocol for bluetooth piconets using elliptic curve cryptography
-
DOI 10.1007/s11235-005-1689-0
-
Hwang, M.-S., Lee, C.-C., Lee, J.-Z., & Yang, C.-C. (2005). A secure protocol for bluetooth piconets using elliptic curve cryptography. Telecommunication Systems, 29(3), 165-180. (Pubitemid 41126277)
-
(2005)
Telecommunication Systems
, vol.29
, Issue.3
, pp. 165-180
-
-
Hwang, M.-S.1
Lee, C.-C.2
Lee, J.-Z.3
Yang, C.-C.4
-
14
-
-
84875347025
-
An efficient authentication protocol for GSM networks
-
Munich, Germany, May 2000
-
Hwang, M.-S., Tang, Y.-L., & Lee, C.-C. (2000). An efficient authentication protocol for GSM networks. In AFCEA/IEEE Euro- Comm'2000 (pp. 326-330), Munich, Germany, May 2000.
-
(2000)
AFCEA/IEEE Euro- Comm'2000
, pp. 326-330
-
-
Hwang, M.-S.1
Tang, Y.-L.2
Lee, C.-C.3
-
15
-
-
0000875129
-
Performance modeling of an auxiliary user location strategy in a PCS network
-
Jain, R., & Lin, Y. B. (1995). Performance modeling of an auxiliary user location strategy in a PCS network. ACM-Baltzer Wireless Networks, 1(2), 197-210.
-
(1995)
ACM-Baltzer Wireless Networks
, vol.1
, Issue.2
, pp. 197-210
-
-
Jain, R.1
Lin, Y.B.2
-
17
-
-
0029360131
-
Security issues in a CDPD wireless network
-
Karger, P. A., Frankel, Y., & Herzberg, A. (1995). Security issues in a CDPD wireless network. IEEE Personal Communications, 2, 16-27.
-
(1995)
IEEE Personal Communications
, vol.2
, pp. 16-27
-
-
Karger, P.A.1
Frankel, Y.2
Herzberg, A.3
-
18
-
-
36048939339
-
Mutual authentication and key agreement for GSM
-
June 2006
-
Kumar, K. P., Shailaja, G., Kavitha, A., & Saxena, A. (2006). Mutual authentication and key agreement for GSM. In International conference on mobile business (pp. 25-28), June 2006.
-
(2006)
International Conference on Mobile Business
, pp. 25-28
-
-
Kumar, K.P.1
Shailaja, G.2
Kavitha, A.3
Saxena, A.4
-
19
-
-
0032676481
-
Enhanced privacy and authentication for the global system for mobile communications
-
Lee, C. H., Hwang, M.-S., & Yang, W. P. (1999). Enhanced privacy and authentication for the global system for mobile communications. Wireless Networks, 5, 231-243.
-
(1999)
Wireless Networks
, vol.5
, pp. 231-243
-
-
Lee, C.H.1
Hwang, M.-S.2
Yang, W.P.3
-
20
-
-
46749113953
-
A new authentication protocol based on pointer forwarding for mobile communications
-
Lee, C.-C., Hwang, M.-S., & Liao, I.-E. (2008). A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communications and Mobile Computing, 8(5), 661-672.
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, Issue.5
, pp. 661-672
-
-
Lee, C.-C.1
Hwang, M.-S.2
Liao, I.-E.3
-
21
-
-
4544330565
-
Extension of authentication protocol for GSM
-
Lee, C.-C., Hwang, M.-S., & Yang, W.-P. (2003). Extension of authentication protocol for GSM. IEE Proceedings. Communications, 150(2), 91-95.
-
(2003)
IEE Proceedings. Communications
, vol.150
, Issue.2
, pp. 91-95
-
-
Lee, C.-C.1
Hwang, M.-S.2
Yang, W.-P.3
-
22
-
-
79951813707
-
An extended certificate-based authentication and security protocol for mobile networks
-
Lee, C.-C., Liao, I.-E., & Hwang, M.-S. (2009). An extended certificate-based authentication and security protocol for mobile networks. Information Technology and Control, 38(1), 61-66.
-
(2009)
Information Technology and Control
, vol.38
, Issue.1
, pp. 61-66
-
-
Lee, C.-C.1
Liao, I.-E.2
Hwang, M.-S.3
-
23
-
-
79951814616
-
Improved security mechanism for mobile IPv6
-
Li, J., Zhang, P., & Sampalli, S. (2008). Improved security mechanism for mobile IPv6. International Journal of Network Security, 6(3), 291-300.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.3
, pp. 291-300
-
-
Li, J.1
Zhang, P.2
Sampalli, S.3
-
25
-
-
0033332268
-
Secure communication mechanisms for GSM networks
-
DOI 10.1109/30.809184
-
Lo, C.-C., & Chen, Y.-J. (1999). Secure communication mechanisms for GSM networks. IEEE Transactions on Consumer Electronics, 45(4), 1074-1080. (Pubitemid 30561606)
-
(1999)
IEEE Transactions on Consumer Electronics
, vol.45
, Issue.4
, pp. 1074-1080
-
-
Lo, C.-C.1
Chen, Y.-J.2
-
27
-
-
79951809334
-
Protection of an intrusion detection engine with watermarking in ad hoc networks
-
Mitrokotsa, A., Komninos, N., & Douligeris, C. (2010). Protection of an intrusion detection engine with watermarking in ad hoc networks. International Journal of Network Security, 10(2), 93-106.
-
(2010)
International Journal of Network Security
, vol.10
, Issue.2
, pp. 93-106
-
-
Mitrokotsa, A.1
Komninos, N.2
Douligeris, C.3
-
28
-
-
0028397595
-
Authentication of mobile users
-
Molva, R., Samfat, D., & Tsudik, G. (1994). Authentication of mobile users. IEEE Network, 8(2), 26-34.
-
(1994)
IEEE Network
, vol.8
, Issue.2
, pp. 26-34
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
29
-
-
84874825833
-
A game theoretic formulation for intrusion detection in mobile ad hoc networks
-
Patcha, A., & Park, J.-M. (2006). A game theoretic formulation for intrusion detection in mobile ad hoc networks. International Journal of Network Security, 2(2), 131-137.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.2
, pp. 131-137
-
-
Patcha, A.1
Park, J.-M.2
-
30
-
-
84944291851
-
Overview of the GSM system and protocol architecture
-
Rahnema, M. (1993). Overview of the GSM system and protocol architecture. IEEE Communication Magazine, 31, 92-100.
-
(1993)
IEEE Communication Magazine
, vol.31
, pp. 92-100
-
-
Rahnema, M.1
-
31
-
-
44549083472
-
Pulsing RoQ DDoS attacking and defense scheme in mobile ad hoc networks
-
Ren,W. (2007). Pulsing RoQ DDoS attacking and defense scheme in mobile ad hoc networks. International Journal of Network Security, 4(2), 227-234.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 227-234
-
-
Ren, W.1
-
32
-
-
0028397595
-
Authentication of mobile users
-
Samfat, D., Molva, R., & Tsudik, G. (1994). Authentication of mobile users. IEEE Network, 8, 26-34.
-
(1994)
IEEE Network
, vol.8
, pp. 26-34
-
-
Samfat, D.1
Molva, R.2
Tsudik, G.3
-
33
-
-
0032685793
-
Performance of an enhanced GSM protocol supporting non-repudiation of service
-
Stach, J. F., Park, E. K., & Makki, K. (1999). Performance of an enhanced GSM protocol supporting non-repudiation of service. Computer Communications, 22, 675-680.
-
(1999)
Computer Communications
, vol.22
, pp. 675-680
-
-
Stach, J.F.1
Park, E.K.2
Makki, K.3
-
35
-
-
63149108602
-
Security measures and weaknesses of the GPRS security architecture
-
Xenakis, C. (2008). Security measures and weaknesses of the GPRS security architecture. International Journal of Network Security, 6(2), 158-169.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.2
, pp. 158-169
-
-
Xenakis, C.1
-
36
-
-
37549016055
-
A secure mobile IP registration protocol
-
Yang, C.-Y., & Shiu, C.-Y. (2005). A secure mobile IP registration protocol. International Journal of Network Security, 1(1), 38-45.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.1
, pp. 38-45
-
-
Yang, C.-Y.1
Shiu, C.-Y.2
-
37
-
-
62949124681
-
Integrity of mobile agents: A new approach
-
Zwierko, A., & Kotulski, Z. (2007). Integrity of mobile agents: A new approach. International Journal of Network Security, 4(2), 201-211.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 201-211
-
-
Zwierko, A.1
Kotulski, Z.2
|