-
1
-
-
0031257939
-
An authentication technique based on distributed security management for the global mobility network
-
Suzukiz S, Nakada K. An authentication technique based on distributed security management for the global mobility network. IEEE Journal on Selected Areas in Communications 1997; 15(8): 1608-1617.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzukiz, S.1
Nakada, K.2
-
2
-
-
0033907037
-
Extensions to an authentication technique proposed for the global mobility network
-
Buttyan L, Gbaguidi C, Staamann S, Wilhelm U. Extensions to an authentication technique proposed for the global mobility network. IEEE Transactions on Communications 2000; 48(3): 373-376.
-
(2000)
IEEE Transactions on Communications
, vol.48
, Issue.3
, pp. 373-376
-
-
Buttyan, L.1
Gbaguidi, C.2
Staamann, S.3
Wilhelm, U.4
-
3
-
-
0035135698
-
Authentication of mobile users in third generation mobile systems
-
Tzeng ZJ, Tzeng WG. Authentication of mobile users in third generation mobile systems. Wireless Personal Communications 2001; 16(1): 35-50.
-
(2001)
Wireless Personal Communications
, vol.16
, Issue.1
, pp. 35-50
-
-
Tzeng, Z.J.1
Tzeng, W.G.2
-
5
-
-
67649519339
-
A novel network mobility handoff scheme using SIP and SCTP for multimedia applications
-
Leu FY. A novel network mobility handoff scheme using SIP and SCTP for multimedia applications. Journal of Network and Computer Applications 2009; 32(5): 1073-1091.
-
(2009)
Journal of Network and Computer Applications
, vol.32
, Issue.5
, pp. 1073-1091
-
-
Leu, F.Y.1
-
6
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments.
-
Zhu J, Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004; 50(1): 230-234.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
-
7
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee CC, Hwang MS, Liao IE. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006; 53(5): 1683-1687.
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
8
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
Wu CC, Lee WB, Tsaur WJ. A secure authentication scheme with anonymity for wireless communications. IEEE Communication Letters 2008; 12(10): 722-723.
-
(2008)
IEEE Communication Letters
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
9
-
-
58149108946
-
An efficient mobile authentication scheme for wireless networks
-
Tang C, Wu DO. An efficient mobile authentication scheme for wireless networks. IEEE Transactions on Wireless Communications 2008; 7(4): 1408-1416.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.4
, pp. 1408-1416
-
-
Tang, C.1
Wu, D.O.2
-
10
-
-
59649101587
-
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
Chang CC, Lee CY, Chiu YC. Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 2009; 3(2): 611-618.
-
(2009)
Computer Communications
, vol.3
, Issue.2
, pp. 611-618
-
-
Chang, C.C.1
Lee, C.Y.2
Chiu, Y.C.3
-
11
-
-
78449298894
-
An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks
-
Chang CC, Tsai HC. An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. IEEE Transactions on Wireless Communications 2010; 9(11): 3346-3353.
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, Issue.11
, pp. 3346-3353
-
-
Chang, C.C.1
Tsai, H.C.2
-
12
-
-
84865236311
-
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network
-
Fu AM, Zhang YQ, Zhu ZC, Jing Q, Feng JY. An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network. Computers & Security 2012; 31(6): 741-749.
-
(2012)
Computers & Security
, vol.31
, Issue.6
, pp. 741-749
-
-
Fu, A.M.1
Zhang, Y.Q.2
Zhu, Z.C.3
Jing, Q.4
Feng, J.Y.5
-
13
-
-
78649983188
-
A fast handover authentication mechanism based on ticket for IEEE 802.16m
-
Fu AM, Zhang YQ, Zhu ZC, Liu XF. A fast handover authentication mechanism based on ticket for IEEE 802.16m. IEEE Communication Letters 2010; 14(12): 1134-1140.
-
(2010)
IEEE Communication Letters
, vol.14
, Issue.12
, pp. 1134-1140
-
-
Fu, A.M.1
Zhang, Y.Q.2
Zhu, Z.C.3
Liu, X.F.4
-
14
-
-
82755161699
-
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
-
Mun H, Han K, Lee YS, Yeun CY, Choi HH. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling 2012; 55(1- 2): 214-222.
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.1-2
, pp. 214-222
-
-
Mun, H.1
Han, K.2
Lee, Y.S.3
Yeun, C.Y.4
Choi, H.H.5
-
15
-
-
84887265696
-
A new mutual-authenticated scheme for a smart card in wireless communications
-
Wang CY, Li X, He MX. A new mutual-authenticated scheme for a smart card in wireless communications. Journal of Computational Information Systems 2013; 9(20): 8199-8206.
-
(2013)
Journal of Computational Information Systems
, vol.9
, Issue.20
, pp. 8199-8206
-
-
Wang, C.Y.1
Li, X.2
He, M.X.3
-
16
-
-
84876519348
-
Anonymous authentication scheme of trusted mobile terminal under mobile Internet
-
Zhang DD, Ma ZF, Niu XX, Peng Y. Anonymous authentication scheme of trusted mobile terminal under mobile Internet. The Journal of China Universities of Posts and Telecommunications 2013; 20(1): 58-65.
-
(2013)
The Journal of China Universities of Posts and Telecommunications
, vol.20
, Issue.1
, pp. 58-65
-
-
Zhang, D.D.1
Ma, Z.F.2
Niu, X.X.3
Peng, Y.4
-
17
-
-
84886081372
-
Secure mobile user authentication and key agreement protocol with privacy protection in global mobility networks
-
Taiwan
-
Xie Q, Bao MJ, Dong N, Hu B. Secure mobile user authentication and key agreement protocol with privacy protection in global mobility networks. In International Symposium on Biometrics and Security Technologies, Taiwan, 2013; 124-129.
-
(2013)
International Symposium on Biometrics and Security Technologies
, pp. 124-129
-
-
Xie, Q.1
Bao, M.J.2
Dong, N.3
Hu, B.4
-
20
-
-
84945119254
-
Entity authentication and key distribution
-
Advances in Cryptology - Crypto'93, California, USA
-
Bellare M, Rogaway P. Entity authentication and key distribution. In Advances in Cryptology - Crypto'93, California, USA, 1993; 232-249.
-
(1993)
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
23
-
-
24944540933
-
Wireless local area network (WLAN) interworking security
-
3GPP TS 33.234
-
3GPP. Wireless local area network (WLAN) interworking security. 3GPP TS 33.234, 2004.
-
(2004)
-
-
-
24
-
-
84855203308
-
Computational and energy costs of cryptographic algorithms on handheld devices
-
Rif-Pous H, Herrera-Joancomart J. Computational and energy costs of cryptographic algorithms on handheld devices. Future Internet 2011; 3(1): 31-48.
-
(2011)
Future Internet
, vol.3
, Issue.1
, pp. 31-48
-
-
Rif-Pous, H.1
Herrera-Joancomart, J.2
-
25
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
Xu J, Zhou WT, Feng DG. An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 2009; 31(4): 723-728.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhou, W.T.2
Feng, D.G.3
-
27
-
-
84876783591
-
Cryptology and the birthday paradox
-
Meijer AR. Cryptology and the birthday paradox. The UMAP Journal 1996; 17(1): 71-84.
-
(1996)
The UMAP Journal
, vol.17
, Issue.1
, pp. 71-84
-
-
Meijer, A.R.1
|