-
1
-
-
0031257939
-
An authentication technique based on distributed security management for the global mobility network
-
PII S0733871697060836
-
Suzukiz S, Nakada K,. An authentication technique based on distributed security management for the global mobility network. IEEE Journal Selected Areas in Communications 1997; 15 (8): 1608-1617. (Pubitemid 127583971)
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzuki, S.1
Nakada, K.2
-
2
-
-
0033907037
-
Extensions to an authentication technique proposed for the global mobility network
-
DOI 10.1109/26.837039
-
Buttyan L, Gbaguidi C, Staamann S, Wilhelm U,. Extensions to an authentication technique proposed for the global mobility network. IEEE Transactions on Communications 2000; 48 (3): 373-376. (Pubitemid 30589215)
-
(2000)
IEEE Transactions on Communications
, vol.48
, Issue.3
, pp. 373-376
-
-
Buttyan, L.1
Gbaguidi, C.2
Staamann, S.3
Wilhelm, U.4
-
3
-
-
0035135698
-
Authentication of mobile users in third generation mobile system
-
Tzeng ZJ, Tzeng WG,. Authentication of mobile users in third generation mobile system. Wireless Personal Communications 2001; 16 (1): 35-50.
-
(2001)
Wireless Personal Communications
, vol.16
, Issue.1
, pp. 35-50
-
-
Tzeng, Z.J.1
Tzeng, W.G.2
-
4
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
Hwang KF, Chang CC,. A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Transactions on Wireless Communications 2003; 2 (2): 400-407.
-
(2003)
IEEE Transactions on Wireless Communications
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.F.1
Chang, C.C.2
-
5
-
-
78650860311
-
A strong user authentication scheme with smart cards for wireless communications
-
(in press)
-
He D, Ma M, Zhang Y, Chen C, Bu J,. A strong user authentication scheme with smart cards for wireless communications. Computer Communications 2010 (in press).
-
(2010)
Computer Communications
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
Bu, J.5
-
6
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Zhu J, Ma J,. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004; 50 (1): 230-234.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
-
7
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee CC, Hwang MS, Liao IE,. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006; 53 (5): 1683-1687.
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
8
-
-
59649101587
-
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
Chang C-C, Lee C-Y, Chiu Y-C,. Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 2009; 32: 611-618.
-
(2009)
Computer Communications
, vol.32
, pp. 611-618
-
-
Chang, C.-C.1
Lee, C.-Y.2
Chiu, Y.-C.3
-
9
-
-
80053052870
-
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
-
(in press)
-
Xu J, Zhu W-T, Feng D-G,. An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications 2010 (in press).
-
(2010)
Computer Communications
-
-
Xu, J.1
Zhu, W.-T.2
Feng, D.-G.3
-
10
-
-
68349157387
-
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
-
Youn T-Y, Park Y-H, Lim J,. Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters 2009; 13 (7): 471-473.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.7
, pp. 471-473
-
-
Youn, T.-Y.1
Park, Y.-H.2
Lim, J.3
-
12
-
-
80053053939
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
(in press)
-
Chen C, He D, Chan S, Bu J, Gao Y, Fan R,. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2010 (in press).
-
(2010)
International Journal of Communication Systems
-
-
Chen, C.1
He, D.2
Chan, S.3
Bu, J.4
Gao, Y.5
Fan, R.6
-
14
-
-
73249134721
-
-
National Institute of Standards and Technology, US Department of Commerce. Secure Hash Standard
-
National Institute of Standards and Technology, US Department of Commerce. Secure Hash Standard. US Federal Information Processing Standard Publication, 2002; 180-2.
-
(2002)
US Federal Information Processing Standard Publication
, pp. 180-182
-
-
-
18
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
Messerges TS, Dabbish EA, Sloan RH,. Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51 (5): 541-552. (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
20
-
-
18844403113
-
Performance analysis of cryptographic protocols on handheld devices
-
Proceedings - Third IEEE International Symposium on Network Computing and Applications, NCA 2004
-
Argyroudis PG, Verma R, Tewari H, O'Mahony D,. Performance analysis of cryptographic protocols on handheld devices. In Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 2004; 169-174. (Pubitemid 40681673)
-
(2004)
Proceedings - Third IEEE International Symposium on Network Computing and Applications, NCA 2004
, pp. 169-174
-
-
Argyroudis, P.G.1
Verma, R.2
Tewari, H.3
O'Mahony, D.4
-
23
-
-
48749109633
-
Energy consumption and computational analysis of Rijndael-AES
-
Doomun MR, Soyjaudah KS, Bundhoo D,. Energy consumption and computational analysis of Rijndael-AES. In Proceedings of the Third IEEE International Conference in Central Asia on Internet: The Next Generation of Mobile, Wireless and Optical Communications Networks (ICI 2007), 2007; 1-6.
-
(2007)
Proceedings of the Third IEEE International Conference in Central Asia on Internet: The Next Generation of Mobile, Wireless and Optical Communications Networks (ICI 2007)
, pp. 1-6
-
-
Doomun, M.R.1
Soyjaudah, K.S.2
Bundhoo, D.3
-
24
-
-
0004116989
-
-
(2nd edn). MIT Press: Cambridge, MA
-
Cormen TH, Leiserson CE, Rivest RL, Stein C,. 2001. Introduction to Algorithms (2nd edn). MIT Press: Cambridge, MA.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
25
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
DOI 10.1109/TMC.2006.16
-
Potlapally NR, Ravi S, Raghunathan A, Jha NK,. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing 2006; 5 (2): 128-143. (Pubitemid 43671073)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
|