-
1
-
-
4544286919
-
Privacy and authentication protocol providing anonymous channels in GSM
-
Nov.
-
A. Peinado, "Privacy and authentication protocol providing anonymous channels in GSM," Comput. Commun., vol. 27, no. 17, pp. 1709-1715, Nov. 2004.
-
(2004)
Comput. Commun.
, vol.27
, Issue.17
, pp. 1709-1715
-
-
Peinado, A.1
-
2
-
-
54949140060
-
A dynamic authentication scheme for mobile transactions
-
Jan.
-
B. S. Babu and P. Venkataram, "A dynamic authentication scheme for mobile transactions," Int. J. Netw. Secur., vol. 8, no. 1, pp. 59-74, Jan. 2009.
-
(2009)
Int. J. Netw. Secur.
, vol.8
, Issue.1
, pp. 59-74
-
-
Babu, B.S.1
Venkataram, P.2
-
4
-
-
11244304396
-
A man-in-the-middle attack on UMTS
-
New York
-
U.Meyer and S.Wetzel, "A man-in-the-middle attack on UMTS," in Proc. 3rd ACM WiSe, New York, 2004, pp. 90-97.
-
(2004)
Proc. 3rd ACM WiSe
, pp. 90-97
-
-
Meyer, U.1
Wetzel, S.2
-
5
-
-
83655200936
-
-
Technical Specification Group Services and System Aspects; 3G Security; Security Architecture, Third Generation Partnership Project, Tech. Rep. Tech. Spec. 3G TS 33.102 V3.7.0
-
Technical Specification Group Services and System Aspects; 3G Security; Security Architecture, Third Generation Partnership Project, Tech. Rep. Tech. Spec. 3G TS 33.102 V3.7.0, 2000.
-
(2000)
-
-
-
6
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
Mar.
-
M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 734-742, Mar. 2005.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
-
7
-
-
80053096670
-
Cryptanalysis of security enhancement for a modified authentication key agreement protocol
-
Jul
-
K.-M. Cheng, T.-Y. Chang, and J.-W. Lo, "Cryptanalysis of security enhancement for a modified authentication key agreement protocol," Int. J. Netw. Secur., vol. 11, no. 1, pp. 55-57, Jul. 2010.
-
(2010)
Int. J. Netw. Secur.
, vol.11
, Issue.1
, pp. 55-57
-
-
Cheng, K.-M.1
Chang, T.-Y.2
Lo, J.-W.3
-
8
-
-
83655161144
-
Security enhancement for a modified authenticated key agreement protocol
-
C. C. Chang, K. F. Hwang, and I. C. Lin, "Security enhancement for a modified authenticated key agreement protocol," Int. J. Comput. Numer. Anal. Appl., vol. 3, no. 1, pp. 1-7, 2003.
-
(2003)
Int. J. Comput. Numer. Anal. Appl.
, vol.3
, Issue.1
, pp. 1-7
-
-
Chang, C.C.1
Hwang, K.F.2
Lin, I.C.3
-
9
-
-
0032658583
-
Simple authenticated key agreement algorithm
-
Jun.
-
D. Seo and P. Sweeney, "Simple authenticated key agreement algorithm," Electron. Lett., vol. 35, no. 13, pp. 1073-1074, Jun.1999.
-
(1999)
Electron. Lett.
, vol.35
, Issue.13
, pp. 1073-1074
-
-
Seo, D.1
Sweeney, P.2
-
10
-
-
83655200932
-
Novel authentication algorithm public key based cryptography in mobile phone systems
-
Feb.
-
S. I. Gy. Gdor, "Novel authentication algorithm public key based cryptography in mobile phone systems," Int. J. Comput. Sci. Netw. Secur., vol. 6, no. 2B, pp. 126-134, Feb. 2006.
-
(2006)
Int. J. Comput. Sci. Netw. Secur.
, vol.6
, Issue.2 B
, pp. 126-134
-
-
Gdor, S.I.G.1
-
11
-
-
83655166842
-
A novel security algorithm for universal mobile telecommunication system
-
Jan
-
J. A. Murtaza Naveed Akhtar and A. Ali Minhas, "A novel security algorithm for universal mobile telecommunication system," Int. J. Multimedia Ubiquitous Eng., vol. 5, no. 1, pp. 1-18, Jan. 2010.
-
(2010)
Int. J. Multimedia Ubiquitous Eng.
, vol.5
, Issue.1
, pp. 1-18
-
-
Murtaza Naveed Akhtar, J.A.1
Ali Minhas, A.2
-
12
-
-
20844442672
-
One-pass GPRS and IMS authentication procedure for UMTS
-
Jun.
-
Y.-B. Lin, M.-F. Chang, M.-T. Hsu, and L.-Y. Wu, "One-pass GPRS and IMS authentication procedure for UMTS," IEEE J. Sel. Areas Commun., vol. 23, no. 6, pp. 1233-1239, Jun. 2005.
-
(2005)
IEEE J. Sel. Areas Commun.
, vol.23
, Issue.6
, pp. 1233-1239
-
-
Lin, Y.-B.1
Chang, M.-F.2
Hsu, M.-T.3
Wu, L.-Y.4
-
14
-
-
33744500005
-
Authentication and key agreement protocol for UMTS with low bandwidth consumption
-
C.-M. Huang and J.-W. Li, "Authentication and key agreement protocol for UMTS with low bandwidth consumption," in Proc. 19th Int. Conf. AINA, 2005, pp. 392-397.
-
(2005)
Proc. 19th Int. Conf. AINA
, pp. 392-397
-
-
Huang, C.-M.1
Li, J.-W.2
-
15
-
-
33751544496
-
A new authentication protocol for UMTS mobile networks
-
Apr.
-
J. Al-Saraireh and S. Yousef, "A new authentication protocol for UMTS mobile networks," EURASIP J. Wireless Commun. Netw., vol. 2006, no. 2, p. 19, Apr. 2006.
-
(2006)
EURASIP J. Wireless Commun. Netw.
, vol.2006
, Issue.2
, pp. 19
-
-
Al-Saraireh, J.1
Yousef, S.2
-
16
-
-
36348930056
-
Nested one-time secret mechanisms for fast mutual authentication in mobile communications
-
E. Chun-I, P.-H. Ho, and H.-Y. Chen, "Nested one-time secret mechanisms for fast mutual authentication in mobile communications," in Proc. IEEE Wireless Commun. Netw. Conf., 2007, pp. 2714-2719.
-
(2007)
Proc.IEEE Wireless Commun. Netw. Conf.
, pp. 2714-2719
-
-
Chun-I, E.1
Ho, P.-H.2
Chen, H.-Y.3
-
17
-
-
73149084427
-
A cocktail protocol with the authentication and key agreement on the UMTS
-
Feb
-
H.-H. Ou, M.-S. Hwang, and J.-K. Jan, "A cocktail protocol with the authentication and key agreement on the UMTS," J. Syst. Softw., vol. 83, no. 2, pp. 316-325, Feb. 2010.
-
(2010)
J. Syst. Softw.
, vol.83
, Issue.2
, pp. 316-325
-
-
Ou, H.-H.1
Hwang, M.-S.2
Jan, J.-K.3
-
18
-
-
77950642661
-
Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS
-
Apr
-
S.Wu, Y. Zhu, and Q. Pu, "Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS," Commun. Lett., vol. 14, no. 4, pp. 366-368, Apr. 2010.
-
(2010)
Commun. Lett.
, vol.14
, Issue.4
, pp. 366-368
-
-
Wu, S.1
Zhu, Y.2
Pu, Q.3
-
19
-
-
0004023090
-
-
IBM Zurich Research Lab, Rüschlikon, Switzerland, Tech. Rep. RZ 3120 (#93166)
-
V. Shoup, "On formal models for secure key exchange," IBM Zurich Research Lab, Rüschlikon, Switzerland, Tech. Rep. RZ 3120 (#93166), 1999.
-
(1999)
On Formal Models for Secure Key Exchange
-
-
Shoup, V.1
-
20
-
-
83655184456
-
Adaptive protocol for entity authentication and key agreement in mobile networks
-
M. Zhang, "Adaptive protocol for entity authentication and key agreement in mobile networks," in Proc. ICISC, 2003, pp. 166-183.
-
(2003)
Proc. ICISC
, pp. 166-183
-
-
Zhang, M.1
|