-
1
-
-
0032024872
-
Survivable mobile phone network architectures: models and solution methods
-
Alevras, D., Grotschel, M., Jonas, P., Paul, U., & Wessaly, R. (1998). Survivable mobile phone network architectures: models and solution methods. IEEE Communications Magazine, 36(3), 88–93.
-
(1998)
IEEE Communications Magazine
, vol.36
, Issue.3
, pp. 88-93
-
-
Alevras, D.1
Grotschel, M.2
Jonas, P.3
Paul, U.4
Wessaly, R.5
-
2
-
-
18844403113
-
Performance analysis of cryptographic protocols on handheld devices
-
Cambridge
-
Argyroudis, P. G., Verma, R., Tewari, H., & O’Mahony, D. (2004). Performance analysis of cryptographic protocols on handheld devices. In Proceedings of the third IEEE international conference on Network Computing and Applications (pp. 169–174). Cambridge.
-
(2004)
In Proceedings of the third IEEE international conference on Network Computing and Applications
, pp. 169-174
-
-
Argyroudis, P.G.1
Verma, R.2
Tewari, H.3
O’Mahony, D.4
-
3
-
-
59649101587
-
Enhanced Authentication scheme with anonymity for roaming service in global networks
-
Chang, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhanced Authentication scheme with anonymity for roaming service in global networks. Computer Communications, 32(4), 611–618.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 611-618
-
-
Chang, C.C.1
Lee, C.Y.2
Chiu, Y.C.3
-
4
-
-
0031678247
-
Improving the fault tolerance of GSM networks
-
Chang, M. F., Lin, Y. B., & Su, S. C. (1998). Improving the fault tolerance of GSM networks. IEEE Network, 12(1), 58–63.
-
(1998)
IEEE Network
, vol.12
, Issue.1
, pp. 58-63
-
-
Chang, M.F.1
Lin, Y.B.2
Su, S.C.3
-
5
-
-
85027455461
-
Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks
-
Gope, P., & Hwang, T. (2015). Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Systems Journal,. doi:10.1109/JSYST.2015.2416396.
-
(2015)
IEEE Systems Journal
-
-
Gope, P.1
Hwang, T.2
-
6
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
Bu, J.5
-
7
-
-
0034512548
-
Security architecture for wireless residential networks. In Proceedings of Vehicular Technology Conference
-
Panama, Program
-
Krishnamurthy, P., & Kabara, J. (2000). Security architecture for wireless residential networks. In Proceedings of Vehicular Technology Conference. IEEE VTS-Fall VTC 2000. 52nd, Telecommun. (vol. 4, pp. 1990–1996). Panama, Program.
-
(2000)
IEEE VTS-Fall VTC 2000. 52nd, Telecommun.
, vol.4
, pp. 1990-1996
-
-
Krishnamurthy, P.1
Kabara, J.2
-
8
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
9
-
-
84958780603
-
Authentication and payment in future mobile systems
-
Horn, G., & Preneel, B. (1998). Authentication and payment in future mobile systems. Computer Security—ESORICS 98, Lecture Notes in Computer Science, 1485(19), 277–293.
-
(1998)
Computer Security—ESORICS 98, Lecture Notes in Computer Science
, vol.1485
, Issue.19
, pp. 277-293
-
-
Horn, G.1
Preneel, B.2
-
10
-
-
33645695288
-
Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information
-
Long, M., & Wu, C. H. J. (2006). Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information. IEEE Transactions on Industrial Informatics, 2(1), 40–47.
-
(2006)
IEEE Transactions on Industrial Informatics
, vol.2
, Issue.1
, pp. 40-47
-
-
Long, M.1
Wu, C.H.J.2
-
11
-
-
82755161699
-
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
-
Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55(1–2), 214–222.
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.1-2
, pp. 214-222
-
-
Mun, H.1
Han, K.2
Lee, Y.S.3
Yeun, C.Y.4
Choi, H.H.5
-
13
-
-
26444495514
-
Wireless authentication protocol preserving user anonymity
-
Oiso, Japan
-
Park, J., Go, J., & Kim, K. (2001). Wireless authentication protocol preserving user anonymity. In Proceedings of Symposium on Cryptography and Information Security (pp. 23–26). Oiso, Japan.
-
(2001)
In Proceedings of Symposium on Cryptography and Information Security
, pp. 23-26
-
-
Park, J.1
Go, J.2
Kim, K.3
-
14
-
-
0036694365
-
Security in wireless communication
-
Rahman, M. G., & Imai, H. (2002). Security in wireless communication. Wireless Personal Communications, 22(2), 213–228.
-
(2002)
Wireless Personal Communications
, vol.22
, Issue.2
, pp. 213-228
-
-
Rahman, M.G.1
Imai, H.2
-
15
-
-
0035135698
-
Authentication of mobile users in third generation mobile system
-
Tzeng, Z. J., & Tzeng, W. G. (2001). Authentication of mobile users in third generation mobile system. Wireless Personal Communications, 16(1), 35–50.
-
(2001)
Wireless Personal Communications
, vol.16
, Issue.1
, pp. 35-50
-
-
Tzeng, Z.J.1
Tzeng, W.G.2
-
16
-
-
68949149518
-
Security flaws in authentication protocols with anonymity for wireless environments
-
Xu, J., & Feng, D. (2009). Security flaws in authentication protocols with anonymity for wireless environments. ETRI Journal, 31(4), 460–462.
-
(2009)
ETRI Journal
, vol.31
, Issue.4
, pp. 460-462
-
-
Xu, J.1
Feng, D.2
-
17
-
-
84949187399
-
The performance measurement of cryptographic primitives on palm devices
-
New Orleans, USA
-
Wong, D. S., Fuentes, H. H., & Chan, A. H. (2011). The performance measurement of cryptographic primitives on palm devices. In Proceedings of the 17th annual computer security applications conference (ACSAC 2001) (pp. 92–101). New Orleans, USA.
-
(2011)
In Proceedings of the 17th annual computer security applications conference (ACSAC 2001)
, pp. 92-101
-
-
Wong, D.S.1
Fuentes, H.H.2
Chan, A.H.3
-
18
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
Wu, C. C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722–723.
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
19
-
-
84856430473
-
Security improvement on an anonymous key agreement protocol based on chaotic maps
-
Xue, K., & Hong, P. (2012). Security improvement on an anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 17(7), 2969–2977.
-
(2012)
Communications in Nonlinear Science and Numerical Simulation
, vol.17
, Issue.7
, pp. 2969-2977
-
-
Xue, K.1
Hong, P.2
-
20
-
-
63649131787
-
On the anonymity of some authentication schemes for wireless communications
-
Zeng, P., Cao, Z., Choo, K. K. R., & Wang, S. (2009). On the anonymity of some authentication schemes for wireless communications. IEEE Communications Letters, 13(3), 170–171.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.3
, pp. 170-171
-
-
Zeng, P.1
Cao, Z.2
Choo, K.K.R.3
Wang, S.4
-
21
-
-
84906345040
-
A secure and effective anonymous authentication scheme for roaming service in global mobility networks
-
Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247–269.
-
(2014)
Wireless Personal Communications
, vol.78
, Issue.1
, pp. 247-269
-
-
Zhao, D.1
Peng, H.2
Li, L.3
Yang, Y.4
-
22
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 231–235.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 231-235
-
-
Zhu, J.1
Ma, J.2
|