-
1
-
-
84878266952
-
-
GPP, Technical Specification Group (TSG) SA
-
GPP (2003) 3G Security, Security Architecture, Technical Specification Group (TSG) SA.
-
(2003)
3G Security, Security Architecture
-
-
-
2
-
-
26444610883
-
On traveling incognito
-
Santa Cruz, California, USA
-
Ateniese, G., Krawczyk, A.H. and Tsudik, G. (1994) 'On traveling incognito', Proc. IEEE Workshop on Mobile Systems and Applications. pp. 205-211, Santa Cruz, California, USA.
-
(1994)
Proc. IEEE Workshop on Mobile Systems and Applications.
, pp. 205-211
-
-
Ateniese, G.1
Krawczyk, A.H.2
Tsudik, G.3
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Bellare, M. and Rogaway, P. (1993) 'Random oracles are practical: A paradigm for designing efficient protocols', Proc. 1st ACM Conf. Computer Commun. Security, pp.62-73.
-
(1993)
Proc. 1st ACM Conf. Computer Commun. Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0027641891
-
Privacy and authentication on a portable communications system
-
Beller, M.J., Chang, L.F. and Yacobi, Y. (1993) 'Privacy and authentication on a portable communications system', IEEE J. Sel. Areas Commun., Vol. 11, No. 6, pp.821-829.
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, pp. 6821-6829
-
-
Beller, M.J.1
Chang, L.F.2
Yacobi, Y.3
-
5
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M. and Needham, R. (1990) 'A logic of authentication ', ACM Transactions on Computer System, Vol. 8, No. 1, pp.18-36.
-
(1990)
ACM Transactions on Computer System
, vol.8
, pp. 118-136
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
78449298894
-
An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks
-
Chang, C-C. and Tsai, H-C. (2010) 'An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks', IEEE Trans. Wireless Commun., Vol. 9, No. 11, pp.3346-3353.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.11
, pp. 3346-3353
-
-
Chang, C.-C.1
Tsai, H.-C.2
-
8
-
-
36348930056
-
Netsted onetime secret mechanisms for fast mutual authentication in mobile communications
-
Kowloon Hong Kong
-
Chun I, Ho, P-H. and Chen, H.-Y. (2007) 'Netsted onetime secret mechanisms for fast mutual authentication in mobile communications', IEEE Wireless Communications and Networking Conference, pp. 2714-2719, Kowloon, Hong Kong.
-
(2007)
IEEE Wireless Communications and Networking Conference
, pp. 2714-2719
-
-
Chun, I.1
Ho, P.-H.2
Chen, H.-Y.3
-
9
-
-
84878283193
-
GSM recommendations' GSM release 92 0102-2714-2719 kowloon Hong Kong ETSI (1993
-
ETSI, Release 92 1221
-
ETSI (1993) 'GSM recommendations', GSM Release 92. 01.02-12.21.
-
(1993)
GSM recommendations' GSM
-
-
-
10
-
-
11244267013
-
-
2nd ed., Springer-Verlag, New York
-
Hankerson, D., Menzes, A. and Vanstone, S. (2004) Guide to Elliptic Curve Cryptography, 2nd ed., Springer-Verlag, New York.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menzes, A.2
Vanstone, S.3
-
11
-
-
2542616812
-
Quest for personal control over mobile location privacy
-
He, Q., Wu, D. and Khosla, P. (2004) 'Quest for personal control over mobile location privacy', IEEE Commun. Mag., Vol. 42, No. 5, pp.130-136.
-
(2004)
IEEE Commun. Mag.
, vol.42
, pp. 5130-5136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
12
-
-
33744500005
-
Authentication and key agreement protocol for UMTS with low bandwidth consumption
-
1423523, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
-
Huang, C-M. and Li, J-W. (2005) 'Authentication and key agreement protocol for umts with low bandwidth consumption', Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA), pp. 392-397, Taipei, Taiwan. (Pubitemid 43803865)
-
(2005)
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
, vol.1
, pp. 392-397
-
-
Huang, C.-M.1
Li, J.-W.2
-
13
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
Jiang, Y., Lin, C., Shen, X. and Shi, M. (2006) 'Mutual authentication and key exchange protocols for roaming services in wireless mobile networks', IEEE Trans. Wireless Commun., Vol. 5, No. 9, pp.2569-2576.
-
(2006)
IEEE Trans. Wireless Commun.
, vol.5
, pp. 92569-92576
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
14
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
Johnson, D., Menezes, A. and Vanstone, S. (2001) 'The elliptic curve digital signature algorithm (ECDSA)', Int. J. Inf. Security, Vol. 1, No. 1, pp.36-63.
-
(2001)
Int. J. Inf. Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
16
-
-
19944362854
-
A new delegationbased authentication protocol for use in portable communication systems
-
Lee, W.B. and Yeh, C.K. (2005) 'A new delegationbased authentication protocol for use in portable communication systems', IEEE Trans. Wireless Commun., Vol. 4, No. 1, pp.57-64.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, pp. 157-164
-
-
Lee, W.B.1
Yeh, C.K.2
-
17
-
-
79960838031
-
Provably secure and efficient authentication techniques for the global mobility network
-
Lee, T-F. and Hwang, T. (2011) 'Provably secure and efficient authentication techniques for the global mobility network', The Journal of Systems and Software, Vol. 84, pp. 1717-1725.
-
(2011)
The Journal of Systems and Software
, vol.84
, pp. 1717-1725
-
-
Lee, T.-F.1
Hwang, T.2
-
18
-
-
82755189733
-
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
doi:10.1016/j.mcm.2011.01.010
-
Li, C-T. and Lee, C-C. (2011) 'A novel user authentication and privacy preserving scheme with smart cards for wireless communications', Mathematical and Computer Modelling, doi:10.1016/j.mcm.2011.01.010.
-
(2011)
Mathematical and Computer Modelling
-
-
Li, C.-T.1
Lee, C.-C.2
-
21
-
-
67650870141
-
TK-AKA: Using temporary key on Authentication and Key Agreement protocol on UMTS
-
Ou, H-H., Lin, I-C., Hwang, M-S. and Jan, J-k. (2009) 'TK-AKA: Using temporary key on Authentication and Key Agreement protocol on UMTS', Int. Journal of Network Management, Vol. 19, No. 4, pp.291-303.
-
(2009)
Int. Journal of Network Management
, vol.19
, Issue.4
, pp. 291-303
-
-
Ou, H.-H.1
Lin, I.-C.2
Hwang, M.-S.3
Jan, J.-K.4
-
22
-
-
73149084427
-
A cocktail protocol with the Authentication and Key Agreement on the UMTS
-
Ou, H-H., Hwang, M-S. and Jan, J-k. (2010) 'A cocktail protocol with the Authentication and Key Agreement on the UMTS', Journal of Systems and Software, Vol. 83, No. 2, pp.316-325.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.2
, pp. 316-325
-
-
Ou, H.-H.1
Hwang, M.-S.2
Jan, J.-K.3
-
23
-
-
0004311937
-
-
Artech House Publisher, London, Boston
-
Prasad, R., Mohr, W. and Konhauser, W. (2000) Third Generation Mobile Communication Systems, Artech House Publisher, London, Boston.
-
(2000)
Third Generation Mobile Communication Systems
-
-
Prasad, R.1
Mohr, W.2
Konhauser, W.3
-
24
-
-
84934300668
-
Computing cryptographic algorithms in portable and embedded devices
-
Orlando
-
Ramachandran, A., Zhou, Z. and Huang, D. (2001) 'Computing cryptographic algorithms in portable and embedded devices', Proc. of IEEE PORTABLE 2007, pp. 1-7, Orlando.
-
(2001)
Proc. of IEEE PORTABLE 2007
, pp. 1-7
-
-
Ramachandran, A.1
Zhou, Z.2
Huang, D.3
-
26
-
-
58149108946
-
An efficient mobile authentication scheme for wireless networks
-
Tang, C. and Wu, D.O. (2008) 'An efficient mobile authentication scheme for wireless networks', IEEE Trans. Wireless Commun., Vol. 7, No. 4, pp.1408-1416.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, pp. 41408-41416
-
-
Tang, C.1
Wu, D.O.2
-
27
-
-
77950642661
-
Security analysis of a cocktail protocol with the authentication and key agreement on the umts
-
Wu, S., Zhu, Y. and Pu, Q. (2010) 'Security analysis of a cocktail protocol with the authentication and key agreement on the umts', Comm. Letters., Vol. 14, pp. 366-368
-
(2010)
Comm. Letters.
, vol.14
, pp. 366-368
-
-
Wu, S.1
Zhu, Y.2
Pu, Q.3
-
28
-
-
35449005656
-
Anonymous and authenticated key exchange for roaming networks
-
Yang, G., Wong, D.S. and Deng, X. (2007) 'Anonymous and authenticated key exchange for roaming networks', IEEE Trans. Wireless Commun., Vol. 6, No. 9, pp.3461-3472.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, pp. 93461-93472
-
-
Yang, G.1
Wong, D.S.2
Deng, X.3
-
29
-
-
78651364381
-
Provable secure authentication protocol with anonymity for roaming service in global mobility networks
-
Zhou, T. and Xu, J. (2011) 'Provable secure authentication protocol with anonymity for roaming service in global mobility networks', Computer Networks, Vol. 55, No. 1, pp.205-213.
-
(2011)
Computer Networks
, vol.55
, Issue.1
, pp. 205-213
-
-
Zhou, T.1
Xu, J.2
-
30
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
Zhang, M. and Fang, Y. (2005) 'Security analysis and enhancements of 3GPP authentication and key agreement protocol', IEEE Trans. Wireless Commun., Vol. 4, No. 2, pp.734-742.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, pp. 2734-2742
-
-
Zhang, M.1
Fang, Y.2
|