-
1
-
-
0031075864
-
Trends in mobile satellite technology
-
Comparetto G, Ramirez R: Trends in mobile satellite technology. IEEE Comput 1999, 30(2):44-52.
-
(1999)
IEEE Comput
, vol.30
, Issue.2
, pp. 44-52
-
-
Comparetto, G.1
Ramirez, R.2
-
2
-
-
0032656074
-
Smart antenna system and its application in low-earth-orbit satellite communication systems, in Proceedings of the Microwaves
-
Jeng SS, Lin HP: Smart antenna system and its application in low-earth-orbit satellite communication systems, in Proceedings of the Microwaves. Antennas and Propagation 1999, 146(2):125-130.
-
(1999)
Antennas and Propagation
, vol.146
, Issue.2
, pp. 125-130
-
-
Jeng, S.S.1
Lin, H.P.2
-
3
-
-
0141569860
-
Lightweight security for mobile commerce transactions
-
Lam KY, Chung SL, Gu M, Sun JG: Lightweight security for mobile commerce transactions. Comput Commun 2003, 26(18):2052-2060. 10.1016/S0140-3664(03)00188-9
-
(2003)
Comput Commun
, vol.26
, Issue.18
, pp. 2052-2060
-
-
Lam, K.Y.1
Chung, S.L.2
Gu, M.3
Sun, J.G.4
-
4
-
-
0032678890
-
Security and authentication in PCS
-
Lin HY: Security and authentication in PCS. Comput Electr Eng 1999, 25(4):225-248. 10.1016/S0045-7906(99)00010-5
-
(1999)
Comput Electr Eng
, vol.25
, Issue.4
, pp. 225-248
-
-
Lin, H.Y.1
-
5
-
-
79957632364
-
Authentication protocols for personal communication systems
-
Lin HY, Harn L: Authentication protocols for personal communication systems. ACM SIGCOMM Comput Commun Rev 1995, 25(4):256-261. 10.1145/217391.217456
-
(1995)
ACM SIGCOMM Comput Commun Rev
, vol.25
, Issue.4
, pp. 256-261
-
-
Lin, H.Y.1
Harn, L.2
-
6
-
-
84976719654
-
Secure mobile computing with location information
-
Spreitzer M, Theimer M: Secure mobile computing with location information. Commun ACM 1993, 36(7):27. 10.1145/159544.159558
-
(1993)
Commun ACM
, vol.36
, Issue.7
, pp. 27
-
-
Spreitzer, M.1
Theimer, M.2
-
7
-
-
84964281786
-
-
WAP forum, wireless application protocol, wireless transport layer security specification; version 12-Feb-1999[]
-
WAP forum, wireless application protocol, wireless transport layer security specification; version 12-Feb-1999[http://www.wapforum.org]
-
-
-
-
8
-
-
79251635489
-
Energy-efficient source authentication for secure group communication with low-powered smart devices in hybrid wireless/satellite networks
-
Article ID 392529
-
Ayan RC, John SB: Energy-efficient source authentication for secure group communication with low-powered smart devices in hybrid wireless/satellite networks. EURASIP J Wirel Commun Netw 2011, 1-18. Article ID 392529
-
(2011)
EURASIP J Wirel Commun Netw
, pp. 1-18
-
-
Ayan, R.C.1
John, S.B.2
-
9
-
-
71149099262
-
LTE adaptation for mobile broadband satellite networks
-
Article ID 989062
-
Francesco B, Cecilia B, Enzo AC, Stefano C, Giovanni EC, Massimo N, Claudio P, Marco P, Stefano R, Alessandro VC: LTE adaptation for mobile broadband satellite networks. EURASIP J Wirel Commun Netw 2009, 1-13. Article ID 989062
-
(2009)
EURASIP J Wirel Commun Netw
, pp. 1-13
-
-
Francesco, B.1
Cecilia, B.2
Enzo, A.C.3
Stefano, C.4
Giovanni, E.C.5
Massimo, N.6
Claudio, P.7
Marco, P.8
Stefano, R.9
Alessandro, V.C.10
-
11
-
-
38749150631
-
A QoS architecture for DVB-RCS next generation satellite networks
-
Article ID 58484
-
Thierry G, Pascal B: A QoS architecture for DVB-RCS next generation satellite networks. EURASIP J Wirel Commun Netw 2007, 1-9. Article ID 58484
-
(2007)
EURASIP J Wirel Commun Netw
, pp. 1-9
-
-
Thierry, G.1
Pascal, B.2
-
13
-
-
0034581037
-
Ten risks of PKI: what you're not being told about public-key infrastructure
-
Ellison C, Schneier B: Ten risks of PKI: what you're not being told about public-key infrastructure. Comput Secur J 2000, 16(1):1-7.
-
(2000)
Comput Secur J
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
14
-
-
57849109614
-
An authentication scheme for mobile satellite communication systems
-
Hwang MS, Yang CC, Shiu CY: An authentication scheme for mobile satellite communication systems. ACM SIGOPS Oper Syst Rev 2003, 145(2-3):42-47.
-
(2003)
ACM SIGOPS Oper Syst Rev
, vol.145
, Issue.2-3
, pp. 42-47
-
-
Hwang, M.S.1
Yang, C.C.2
Shiu, C.Y.3
-
15
-
-
33845229781
-
An efficient authentication protocol for mobile satellite communication systems
-
Chang YF, Chang CC: An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Oper Syst Rev 2005, 39(1):70-84. 10.1145/1044552.1044560
-
(2005)
ACM SIGOPS Oper Syst Rev
, vol.39
, Issue.1
, pp. 70-84
-
-
Chang, Y.F.1
Chang, C.C.2
-
16
-
-
57849121084
-
A self-verification authentication mechanism for mobile satellite communication systems
-
Chen TH, Lee WB, Chen HB: A self-verification authentication mechanism for mobile satellite communication systems. Comput Electr Eng 2009, 35(1):41-48. 10.1016/j.compeleceng.2008.05.003
-
(2009)
Comput Electr Eng
, vol.35
, Issue.1
, pp. 41-48
-
-
Chen, T.H.1
Lee, W.B.2
Chen, H.B.3
-
17
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
Aziz A, Diffe W: Privacy and authentication for wireless local area networks. IEEE Pers Commun First Quart 1994, 1(1):25-31.
-
(1994)
IEEE Pers Commun First Quart
, vol.1
, Issue.1
, pp. 25-31
-
-
Aziz, A.1
Diffe, W.2
-
18
-
-
76649098002
-
Performance analysis of novel randomly shifted certification authority authentication protocol for MANETs
-
Article ID 243956
-
Safdar GA, O'Neill MP: Performance analysis of novel randomly shifted certification authority authentication protocol for MANETs. EURASIP J Wirel Commun Netw 2009, 1-11. Article ID 243956
-
(2009)
EURASIP J Wirel Commun Netw
, pp. 1-11
-
-
Safdar, G.A.1
O'Neill, M.P.2
-
19
-
-
79960801509
-
SPM: source privacy for mobile ad hoc networks
-
Article ID 534712
-
Jian R, Yun L, Tongtong L: SPM: source privacy for mobile ad hoc networks. EURASIP J Wirel Commun Netw 2010, 1-10. Article ID 534712
-
(2010)
EURASIP J Wirel Commun Netw
, pp. 1-10
-
-
Jian, R.1
Yun, L.2
Tongtong, L.3
-
20
-
-
78249239779
-
Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks
-
Article ID 695171
-
Vijay V, Diethelm O, Jaleel S, Antoni JH, Sanjay J: Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks. EURASIP J Wirel Commun Netw 2011, 1-12. Article ID 695171
-
(2011)
EURASIP J Wirel Commun Netw
, pp. 1-12
-
-
Vijay, V.1
Diethelm, O.2
Jaleel, S.3
Antoni, J.H.4
Sanjay, J.5
-
21
-
-
79251638037
-
A USIM-based uniform access authentication framework in mobile communication
-
Article ID 867315
-
Li JM, Park YH, Li X: A USIM-based uniform access authentication framework in mobile communication. EURASIP J Wirel Commun Netw 2011, 1-12. Article ID 867315
-
(2011)
EURASIP J Wirel Commun Netw
, pp. 1-12
-
-
Li, J.M.1
Park, Y.H.2
Li, X.3
-
22
-
-
79952175802
-
A forward authentication key management scheme for heterogeneous sensor networks
-
Article ID 296704
-
Huang JY, Liao IE, Tang HW: A forward authentication key management scheme for heterogeneous sensor networks. EURASIP J Wirel Commun Netw 2011, 1-10. Article ID 296704
-
(2011)
EURASIP J Wirel Commun Netw
, pp. 1-10
-
-
Huang, J.Y.1
Liao, I.E.2
Tang, H.W.3
-
24
-
-
15544371957
-
Implementation of the SHA-2 hash family standard using FPGAs
-
Sklavos N, Koufopavlou O: Implementation of the SHA-2 hash family standard using FPGAs. J Supercomput 2005, 31(3):227-248. 10.1007/s11227-005-0086-5
-
(2005)
J Supercomput
, vol.31
, Issue.3
, pp. 227-248
-
-
Sklavos, N.1
Koufopavlou, O.2
-
25
-
-
49849102924
-
SSL/TLS session-aware user authentication
-
Oppliger R, Hauser R, Basin D: SSL/TLS session-aware user authentication. IEEE Comput 2008, 41(3):59-65.
-
(2008)
IEEE Comput
, vol.41
, Issue.3
, pp. 59-65
-
-
Oppliger, R.1
Hauser, R.2
Basin, D.3
-
27
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Bellare M, Pointcheval D, Rogaway P: Authenticated key exchange secure against dictionary attacks. Proceedings of Eurocrypt 2000, LNCS 2000, 1807: 139-155.
-
(2000)
Proceedings of Eurocrypt 2000, LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
28
-
-
84964239057
-
-
Ohkubo M, Matsuo S, Hanatani Y, Sakiyama K, Ohta K: Robust RFID authentication protocol with formal proof and its feasibility, Cryptology ePrint Archive Report 2010/393. 1-23
-
Ohkubo M, Matsuo S, Hanatani Y, Sakiyama K, Ohta K: Robust RFID authentication protocol with formal proof and its feasibility, Cryptology ePrint Archive Report 2010/393. 1-23.
-
-
-
|