-
3
-
-
47649105900
-
Mutual authentication and key agreement based on elliptic curve cryptography for GSM
-
Ammayappan, K.; Saxena, A.; Negi, A. (2006). Mutual authentication and key agreement based on elliptic curve cryptography for GSM. ADCOM, 2006, 183-187.
-
(2006)
ADCOM
, vol.2006
, pp. 183-187
-
-
Ammayappan, K.1
Saxena, A.2
Negi, A.3
-
4
-
-
84974707207
-
-
Biryukov, A.; Shamir, A.; Wagner, D. (2001). Real time cryptanalysis of (A5/1) on (PC), LNCS, vol. 1978, http://www.isaac.cs.berkeley.edu/isaac/gsm- press.html.
-
(2001)
Real Time Cryptanalysis of (A5/1) on (PC), LNCS
, vol.1978
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
5
-
-
0025386404
-
A logic of authentication
-
10.1145/77648.77649
-
Burrows, M.; Abadi, M.; Needham, R. (1990). A logic of authentication. Proceedings of the ACM Transactions on Computer Systems (TOCS), 8(1), 18-36.
-
(1990)
Proceedings of the ACM Transactions on Computer Systems (TOCS)
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
6
-
-
0033907037
-
Extesions to an authentication technique proposed for the global mobile network
-
Buttyan, L.; Gbaguidi, C.; Staamann, S.; Wilhemlm, U. (2000). Extesions to an authentication technique proposed for the global mobile network. Proceedings of the IEEE Transactions on Communications, 48(3), 400-407.
-
(2000)
Proceedings of the IEEE Transactions on Communications
, vol.48
, Issue.3
, pp. 400-407
-
-
Buttyan, L.1
Gbaguidi, C.2
Staamann, S.3
Wilhemlm, U.4
-
7
-
-
17644390205
-
Efficient authentication protocol of GSM
-
10.1016/j.comcom.2005.01.015
-
Chang, C. C.; Lee, J. S.; Chang, Y. F. (2005). Efficient authentication protocol of GSM. Proceedings of the Computer Communications, 28(8), 921-928.
-
(2005)
Proceedings of the Computer Communications
, vol.28
, Issue.8
, pp. 921-928
-
-
Chang, C.C.1
Lee, J.S.2
Chang, Y.F.3
-
10
-
-
11244303182
-
Review of third generation mobile system security architecture
-
Horn, G.; Howard, P. (2000). Review of third generation mobile system security architecture. ISSE.
-
(2000)
ISSE
-
-
Horn, G.1
Howard, P.2
-
11
-
-
33744500005
-
Authentication and key agreement protocol for UMTS with low bandwidth consumption
-
Huang, C.-M.; Li, J.-W. (2005). Authentication and key agreement protocol for UMTS with low bandwidth consumption. In Proceedings of the 19th international conference AINA (pp. 392-397).
-
(2005)
Proceedings of the 19th International Conference AINA
, pp. 392-397
-
-
Huang, C.-M.1
Li, J.-W.2
-
12
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
10.1109/TWC.2003.809452 2029546
-
Hwang, K. F.; Chang, D. C. C. (2003). A self-encryption mechanism for authentication of roaming and teleconference services. Proceedings of the IEEE Transaction of the Wireless Communications, 2(2), 400-407.
-
(2003)
Proceedings of the IEEE Transaction of the Wireless Communications
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.F.1
Chang, D.C.C.2
-
15
-
-
0032676481
-
Enhanced privacy and authentication for global system for mobile communications
-
Lee, C. H.; Hwang, M. S.; Yang, W. P. (1999). Enhanced privacy and authentication for global system for mobile communications. Proceedings of the Wireless Networks, 5, 231-243.
-
(1999)
Proceedings of the Wireless Networks
, vol.5
, pp. 231-243
-
-
Lee, C.H.1
Hwang, M.S.2
Yang, W.P.3
-
17
-
-
28544452660
-
Private authentication techniques for the global mobility network
-
10.1007/s11277-005-6177-z
-
Lee, T.-F.; Chang, C. C.; Hwang, T. (2005). Private authentication techniques for the global mobility network. Wireless Personal Communications, 35(4), 329-336.
-
(2005)
Wireless Personal Communications
, vol.35
, Issue.4
, pp. 329-336
-
-
Lee, T.-F.1
Chang, C.C.2
Hwang, T.3
-
21
-
-
73149084427
-
A cocktail protocol with the authentication and key agreement on the UMTS
-
10.1016/j.jss.2009.08.019
-
Ou, H.-H.; Hwang, M.-S.; Jan, J. K. (2010). A cocktail protocol with the authentication and key agreement on the UMTS. Proceedings of the Journal of Systems and Software, 83(2), 316-325.
-
(2010)
Proceedings of the Journal of Systems and Software
, vol.83
, Issue.2
, pp. 316-325
-
-
Ou, H.-H.1
Hwang, M.-S.2
Jan, J.K.3
-
22
-
-
0031257939
-
An authentication technique based on distributed security management for global mobility network
-
10.1109/49.634798
-
Suzuki, S.; Nakanda, K. A. (1997). An authentication technique based on distributed security management for global mobility network. Proceedings of the IEEE Journal on Selected Areas in Communications, 15(8), 1608-1617.
-
(1997)
Proceedings of the IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzuki, S.1
Nakanda, K.A.2
-
23
-
-
77953856139
-
The study on the application of BAN logic in formal analysis of authentication protocols [C]
-
Wen, J.; Zhang, M.; Li, X. (2005). The study on the application of BAN logic in formal analysis of authentication protocols [C]. Proceedings of the 7th International Conference on Electronic Commerce, 113, 744-747.
-
(2005)
Proceedings of the 7th International Conference on Electronic Commerce
, vol.113
, pp. 744-747
-
-
Wen, J.1
Zhang, M.2
Li, X.3
-
24
-
-
35048826772
-
Adaptive protocol for entity authentication and key agreement in mobile networks
-
Zhang, M. A. (2003). Adaptive protocol for entity authentication and key agreement in mobile networks. In Proceedings of the ICISC, 2003 (pp. 166-183).
-
(2003)
Proceedings of the ICISC, 2003
, pp. 166-183
-
-
Zhang, M.A.1
-
25
-
-
83655166843
-
Provably-secure enhancement on 3GPP authentication and key agreement protocol verizon Commun
-
Zhang, M. (2003). Provably-secure enhancement on 3GPP authentication and key agreement protocol verizon Commun. In Proceedings of the cryptology ePrint archive Rep. 2003/092.
-
(2003)
Proceedings of the Cryptology EPrint Archive Rep. 2003/092
-
-
Zhang, M.1
-
26
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
10.1109/TWC.2004.842941
-
Zhang, M.; Fang, Y. (2005). Security analysis and enhancements of 3GPP authentication and key agreement protocol. Proceedings of the IEEE Transactions on Wireless Communications, 4(2), 734-742.
-
(2005)
Proceedings of the IEEE Transactions on Wireless Communications
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
|