-
1
-
-
0026393897
-
Privacy and authentication on a portable communications system
-
(Phoenix, Arizona), December 1991
-
Beller MJ, Chang L-F, Yacobi Y,. Privacy and authentication on a portable communications system. IEEE Global Telecommunications Conference (GLOBECOM' 91), (Phoenix, Arizona), December 1991; 1922-1927.
-
IEEE Global Telecommunications Conference (GLOBECOM' 91)
, pp. 1922-1927
-
-
Beller, M.J.1
Chang, L.-F.2
Yacobi, Y.3
-
3
-
-
0032676481
-
Enhanced privacy and authentication for the global system of mobile communications
-
Lee C-H, Hwang M-S, Yang W-P,. Enhanced privacy and authentication for the global system of mobile communications. Wireless Networks 1999; 5: 231-243.
-
(1999)
Wireless Networks
, vol.5
, pp. 231-243
-
-
Lee, C.-H.1
Hwang, M.-S.2
Yang, W.-P.3
-
4
-
-
0031257939
-
An authentication technique based on distributed security management for the global mobility network
-
PII S0733871697060836
-
Suzuki S, Nakada K,. Authentication technique based on distributed security management for the global mobility network. IEEE Journal on Selected Areas in Communications 1997; 15: 1608-1617. (Pubitemid 127583971)
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzuki, S.1
Nakada, K.2
-
5
-
-
63149108602
-
Security measures and weaknesses of the GPRS security architecture
-
Xenakis C,. Security measures and weaknesses of the GPRS security architecture. International Journal of Network Security 2008; 6 (2): 158-169.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.2
, pp. 158-169
-
-
Xenakis, C.1
-
6
-
-
0029359261
-
Techniques for privacy and authentication in personal communication systems
-
Brown D,. Techniques for privacy and authentication in personal communication systems. IEEE Personal Communications 1995; 2: 6-10.
-
(1995)
IEEE Personal Communications
, vol.2
, pp. 6-10
-
-
Brown, D.1
-
8
-
-
0031144513
-
Authenticated Key-Exchange in a Mobile Radio Network
-
Hwang M-S, Lee C-H,. Authenticated key-exchange in a mobile radio network. European Transactions on Telecommunications 1997; 8 (3): 265-269. (Pubitemid 127441413)
-
(1997)
European Transactions on Telecommunications
, vol.8
, Issue.3
, pp. 265-269
-
-
Hwang, M.-S.1
Lee, C.-H.2
-
9
-
-
0032690458
-
A novel application of the phone card and its authentication in mobile communications
-
Lee C-H, Hwang M-S, Yang W-P,. A novel application of the phone card and its authentication in mobile communications. Journal of Information Science and Engineering 1999; 15 (4): 471-484.
-
(1999)
Journal of Information Science and Engineering
, vol.15
, Issue.4
, pp. 471-484
-
-
Lee, C.-H.1
Hwang, M.-S.2
Yang, W.-P.3
-
10
-
-
0029358520
-
Privacy and authentication needs of PCS
-
Wilkes JE,. Privacy and authentication needs of PCS. IEEE Personal Communications 1995; 2: 11-15.
-
(1995)
IEEE Personal Communications
, vol.2
, pp. 11-15
-
-
Wilkes, J.E.1
-
13
-
-
73149093942
-
Efficient user authentication and key agreement with user privacy protection
-
Juang W-S, Wu J-L,. Efficient user authentication and key agreement with user privacy protection. International Journal of Network Security 2008; 7 (1): 120-129.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.1
, pp. 120-129
-
-
Juang, W.-S.1
Wu, J.-L.2
-
15
-
-
33746781755
-
Perfect identity concealment in UMTS over radio access links
-
DOI 10.1109/WIMOB.2005.1512853, 1512853, 2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005
-
Barbeau M, Robert J-M,. Perfect identity concealment in UMTS over radio access links. IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005. (WiMob'2005), Vol. 2, August 2005; 72-77. (Pubitemid 44172518)
-
(2005)
2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005
, vol.2
, pp. 72-77
-
-
Barbeau, M.1
Robert, J.-M.2
-
16
-
-
0033365053
-
Anonymous channel and authentication in wireless communications
-
DOI 10.1016/S0140-3664(99)00108-5
-
Juang W-S, Lei C-L, Chang C-Y,. Anonymous channel and authentication in wireless communications. Computer Communications 1999; 22: 1502-1511. (Pubitemid 30501389)
-
(1999)
Computer Communications
, vol.22
, Issue.15
, pp. 1502-1511
-
-
Juang, W.-S.1
Lei, C.-L.2
Chang, C.-Y.3
-
18
-
-
4544286919
-
Privacy and authentication protocol providing anonymous channels in GSM
-
Peinado A,. Privacy and authentication protocol providing anonymous channels in GSM. Computer Communications 2004; 27: 1709-1715.
-
(2004)
Computer Communications
, vol.27
, pp. 1709-1715
-
-
Peinado, A.1
-
19
-
-
70350453453
-
Efficient certificateless authentication and key agreement (CL-AK) for grid computing
-
Wang S, Cao Z, Bao H,. Efficient certificateless authentication and key agreement (CL-AK) for grid computing. International Journal of Network Security 2008; 7 (3): 342-347.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.3
, pp. 342-347
-
-
Wang, S.1
Cao, Z.2
Bao, H.3
-
20
-
-
1542287661
-
On the security of wireless network access with enhancements
-
(San Diego, CA, USA), September
-
Harn L, Hsin W-J,. On the security of wireless network access with enhancements. Proceedings of the 2003 ACM workshop on Wireless security, (San Diego, CA, USA), September 2003; 88-95.
-
(2003)
Proceedings of the 2003 ACM Workshop on Wireless Security
, pp. 88-95
-
-
Harn, L.1
Hsin, W.-J.2
-
21
-
-
0033364756
-
Authentication protocols with nonrepudiation services in personal communication systems
-
DOI 10.1109/4234.781006
-
Lin H-Y, Harn L,. Authentication protocols with nonrepudiation services in personal communication systems. IEEE Communications Letters 1999; 3: 236-238. (Pubitemid 30527370)
-
(1999)
IEEE Communications Letters
, vol.3
, Issue.8
, pp. 236-238
-
-
Lin, H.-Y.1
Harn, L.2
-
22
-
-
0032685793
-
Performance of an enhanced GSM protocol supporting non-repudiation of service
-
Stach JF, Park EK, Makki K,. Performance of an enhanced GSM protocol supporting non-repudiation of service. Computer Communications 1999; 22: 675-680.
-
(1999)
Computer Communications
, vol.22
, pp. 675-680
-
-
Stach, J.F.1
Park, E.K.2
Makki, K.3
-
23
-
-
79953893543
-
TETRA, the industry standard from ETSI
-
(Intercontinental Hotel Dubai), May
-
Friis J,. TETRA, the industry standard from ETSI. 2nd TETRA Middle East Conference, (Intercontinental Hotel Dubai), May 2004.
-
(2004)
2nd TETRA Middle East Conference
-
-
Friis, J.1
-
24
-
-
0033907037
-
Extensions to an authentication technique proposed for the global mobility network
-
DOI 10.1109/26.837039
-
Buttyan L, Gbaguidi C, Staamann S, Wilhelm U,. Extensions to an authentication technique proposed for the global mobility network. IEEE Transactions on Communications 2000; 48: 373-376. (Pubitemid 30589215)
-
(2000)
IEEE Transactions on Communications
, vol.48
, Issue.3
, pp. 373-376
-
-
Buttyan, L.1
Gbaguidi, C.2
Staamann, S.3
Wilhelm, U.4
-
26
-
-
33745701569
-
-
3GPP TS 33.200 3G security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security, Technical Report Release 6, 3GPP, December 2004
-
3GPP TS 33.200, 3GPP: Techinical specification group services and system aspects; 3G security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security, Technical Report Release 6, 3GPP, December 2004.
-
3GPP: Techinical Specification Group Services and System Aspects
-
-
-
27
-
-
33745701569
-
-
3GPP TS 33.200 3G security; Network Domain Security (NDS); IP network layer security, Technical Report Release 6, 3GPP, June 2004
-
3GPP TS 33.200, 3GPP: Techinical specification group services and system aspects; 3G security; Network Domain Security (NDS); IP network layer security, Technical Report Release 6, 3GPP, June 2004.
-
3GPP: Techinical Specification Group Services and System Aspects
-
-
-
28
-
-
0017930809
-
Method for obtaining digital signatures and public key cryptosystems
-
DOI 10.1145/359340.359342
-
Rivest RL, Shamir A, Adleman L,. A method for obtaining digital signatures and public key cryptosystems. Communications ACM 1978; 21: 120-126. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
30
-
-
33847249399
-
-
Technical Report, RSA Laboratories, May 2003
-
Kaliski B,. TWIRL and RSA key size, Technical Report, RSA Laboratories, May 2003.
-
TWIRL and RSA Key Size
-
-
Kaliski, B.1
-
31
-
-
79953886477
-
-
National Institute of Satndards and Technology (NIST), Sepecial publication 800-857: recommendation for key management. part 1: General guideline, Technical Report, January 2003
-
National Institute of Satndards and Technology (NIST), Sepecial publication 800-857: recommendation for key management. part 1: General guideline, Technical Report, January 2003.
-
-
-
-
32
-
-
79953865481
-
-
National Institute of Satndards and Technology (NIST), Advanced encryption standard, Technical Report, FIPS 197, NIST, US Department Commerce, November 2001
-
National Institute of Satndards and Technology (NIST), Advanced encryption standard, Technical Report, FIPS 197, NIST, US Department Commerce, November 2001.
-
-
-
-
36
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
Hwang K-F, Chang C-C,. A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Transactions on Wireless Communications 2003; 2: 400-407.
-
(2003)
IEEE Transactions on Wireless Communications
, vol.2
, pp. 400-407
-
-
Hwang, K.-F.1
Chang, C.-C.2
-
37
-
-
85031767993
-
Speeding up secret computations with insecure auxiliary devices
-
Springer-Verlag 497-506 Lecture Notes in Computer Science
-
Matsumoto T, Kato K, Imai H,. Speeding up secret computations with insecure auxiliary devices. Advances in Cryptology-Proceeding of Crypto'88, Springer-Verlag, 1988; 497-506 Lecture Notes in Computer Science, Vol. 403.
-
(1988)
Advances in Cryptology-Proceeding of Crypto'88
, vol.403
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
38
-
-
0026897713
-
Attack on server assisted authentication protocols
-
Anderson RJ,. Attack on server assisted authentication protocols. Electronics Letters 1992; 28 (15): 1473. (Pubitemid 23566792)
-
(1992)
Electronics Letters
, vol.28
, Issue.15
, pp. 1473
-
-
Anderson, R.J.1
-
39
-
-
84955620732
-
Secure acceleration of DSS signatures using insecure server
-
Lecture Notes in Computer Science
-
Beguin P, Quisquater J-J,. Secure acceleration of DSS signatures using insecure server. Advances in Cryptology-Proceeding of Asiacrypt'94, Springer-Verlag, 1994; 249-259. Lecture Notes in Computer Science, Vol. 917.
-
(1994)
Advances in Cryptology-Proceeding of Asiacrypt'94, Springer-Verlag
, vol.917
, pp. 249-259
-
-
Beguin, P.1
Quisquater, J.-J.2
-
40
-
-
84957639068
-
Fast server-aided RSA signatures secure against active attacks
-
Lecture Notes in Computer Science
-
Beguin P, Quisquater J-J,. Fast server-aided RSA signatures secure against active attacks. Advances in Cryptology-Proceeding of Crypto'95, Springer-Verlag, 1995; 57-69. Lecture Notes in Computer Science, Vol. 963.
-
(1995)
Advances in Cryptology-Proceeding of Crypto'95, Springer-Verlag
, vol.963
, pp. 57-69
-
-
Beguin, P.1
Quisquater, J.-J.2
-
41
-
-
0001796258
-
A new approach to server-aided secret computation
-
Hong S-M, Shin J-B, Kwang H-L, Yoon H,. A new approach to server-aided secret computation. Proceedings of the 1st International Conference on Information Security and Cryptology-ICISC'98, (Seoul, Korea), 1998; 33-45
-
(1998)
Proceedings of the 1st International Conference on Information Security and Cryptology-ICISC'98, (Seoul, Korea)
, pp. 33-45
-
-
Hong, S.-M.1
Shin, J.-B.2
Kwang, H.-L.3
Yoon, H.4
-
42
-
-
0027617773
-
Fast server-aided secret computation protocols for modular exponentiation
-
Kawamura S, Shimbo A,. Fast server-aided secret computation protocols for modular exponentiation. IEEE Journal on Selected Areas in Communications 1993; 11 (5): 778-784.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 778-784
-
-
Kawamura, S.1
Shimbo, A.2
-
43
-
-
79953900066
-
Active trial-and-error attack on SASC protocols
-
Kim H, Lee Y, Hong S-M, Yoon H,. Active trial-and-error attack on SASC protocols. International Journal of Network Security 2006; 2 (2): 105-110.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.2
, pp. 105-110
-
-
Kim, H.1
Lee, Y.2
Hong, S.-M.3
Yoon, H.4
-
44
-
-
79952985411
-
Comment on Wu et al.'s server-aided verification signature schemes
-
Wang Z, Wang L, Yang Y, Hu Z, Comment on Wu et al.'s server-aided verification signature schemes. International Journal of Network Security 2010; 10 (3): 238-240.
-
(2010)
International Journal of Network Security
, vol.10
, Issue.3
, pp. 238-240
-
-
Wang, Z.1
Wang, L.2
Yang, Y.3
Hu, Z.4
-
45
-
-
0029632472
-
Cryptanalysis of secure addition chain for SASC applications
-
Yen S-M,. Cryptanalysis of secure addition chain for SASC applications. IEE Electronics Letters 1995; 31 (3): 175-176.
-
(1995)
IEE Electronics Letters
, vol.31
, Issue.3
, pp. 175-176
-
-
Yen, S.-M.1
|