-
1
-
-
9144239058
-
-
http://www.itu.int/home/imt.html.
-
-
-
-
2
-
-
9144226610
-
-
http://www.3gpp.org/.
-
-
-
-
5
-
-
9144223470
-
Mobile information device profile (MIDP) 2.0
-
"Mobile Information Device Profile (MIDP) 2.0", JSR 118, http://jcp.org/jsr/detail/118.jsp.
-
JSR
, vol.118
-
-
-
6
-
-
84957707067
-
Self-delegation with controlled propagation -or- What if you lose your laptop
-
Springer LNCS
-
O. Goldreich, B. Pftzmann and R.L. Rivest, "Self-delegation with Controlled Propagation -or- What If You Lose Your Laptop", in Proceedings of Crypto 98, Springer LNCS, Vol. 1462, pp. 153-168, 1998.
-
(1998)
Proceedings of Crypto 98
, vol.1462
, pp. 153-168
-
-
Goldreich, O.1
Pftzmann, B.2
Rivest, R.L.3
-
7
-
-
85032463527
-
Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms
-
Springer LNCS
-
D. Chaum, "Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms", in Proceedings of Auscrypt '90, Springer LNCS, Vol. 453, pp. 246-264, 1990.
-
(1990)
Proceedings of Auscrypt '90
, vol.453
, pp. 246-264
-
-
Chaum, D.1
-
8
-
-
0027005999
-
Achieving electronic privacy
-
August
-
D. Chaum, "Achieving Electronic Privacy", Scientific American, pp. 96-101, August 1976.
-
(1976)
Scientific American
, pp. 96-101
-
-
Chaum, D.1
-
9
-
-
0842267408
-
The overview of the new generation mobile communication system and the role of software defined radio technology
-
December
-
H. Harada, M. Kuroda, H. Morikawa, H. Wakana and F. Adachi, "The Overview of the New Generation Mobile Communication System and the Role of Software Defined Radio Technology", IEICE Transactions on Communication, col. E86-B, no. 12, pp. 3374-3384, December 2003.
-
(2003)
IEICE Transactions on Communication
, vol.E86-B
, Issue.12
, pp. 3374-3384
-
-
Harada, H.1
Kuroda, M.2
Morikawa, H.3
Wakana, H.4
Adachi, F.5
-
10
-
-
4544224182
-
Scalable mobile ethernet and fast vertical handover
-
March
-
M. Kuroda, M. Inoue, A. Okubo, T. Sakakura, K. Shimizu and F. Adachi, "Scalable Mobile Ethernet and Fast Vertical Handover", in Proceedings of the IEEE Wireless Communications and Networking Conference 2004, A27-3, March 2004.
-
(2004)
Proceedings of the IEEE Wireless Communications and Networking Conference 2004
, vol.A27
, Issue.3
-
-
Kuroda, M.1
Inoue, M.2
Okubo, A.3
Sakakura, T.4
Shimizu, K.5
Adachi, F.6
-
11
-
-
0003291368
-
Neighbor discovery for IP version 6 (IPv6)
-
IETF, December
-
T. Narten, E. Nordmark and W. Simpson, "Neighbor Discovery for IP Version 6 (IPv6)", RFC 2461, IETF, December 1998.
-
(1998)
RFC
, vol.2461
-
-
Narten, T.1
Nordmark, E.2
Simpson, W.3
-
12
-
-
0035507288
-
Wireless LAN access network architecture for mobile operators
-
J. Ala-Laurila, J. Mikkonen and J. Rinnemaa, "Wireless LAN Access Network Architecture for Mobile Operators", IEEE Communications Magazine, Vol. 39, No. 11, 2001.
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.11
-
-
Ala-Laurila, J.1
Mikkonen, J.2
Rinnemaa, J.3
-
13
-
-
9144230440
-
Design of secure mobile application on cellular phones
-
December
-
M. Kuroda, M. Yoshida, S. Sakurai and T. Munaka, "Design of Secure Mobile Application on Cellular Phones", PCM2002, December 2002.
-
(2002)
PCM2002
-
-
Kuroda, M.1
Yoshida, M.2
Sakurai, S.3
Munaka, T.4
-
14
-
-
9144227241
-
Mobile information device profile for the J2ME™ platform
-
"Mobile Information Device Profile for the J2ME™ Platform", JSR 37, http://jcp.org/jsr/detail/37.jsp.
-
JSR
, vol.37
-
-
-
15
-
-
9144253635
-
J2ME™ connected, limited device configuration
-
"J2ME™ Connected, Limited Device Configuration", JSR 30, http://jcp.org/jsr/detail/30.jsp.
-
JSR
, vol.30
-
-
-
17
-
-
9144267521
-
A secure service architecture for beyond 3G wireless network
-
October
-
M. Yoshida, M. Kuroda, S. Kiyomoto and T. Tanaka, "A Secure Service Architecture for Beyond 3G Wireless Network", WPMC2003, V2, pp. 579-583, October 2003.
-
(2003)
WPMC2003
, vol.2
, pp. 579-583
-
-
Yoshida, M.1
Kuroda, M.2
Kiyomoto, S.3
Tanaka, T.4
-
18
-
-
9144240831
-
Design and evaluation of security architecture for beyond 3G mobile terminals
-
October
-
S. Kiyomoto, T. Tanaka, M. Yoshida and M. Kuroda, "Design and Evaluation of Security Architecture for Beyond 3G Mobile Terminals", WPMC2003, V1, pp. 191-195, October 2003.
-
(2003)
WPMC2003
, vol.1
, pp. 191-195
-
-
Kiyomoto, S.1
Tanaka, T.2
Yoshida, M.3
Kuroda, M.4
-
19
-
-
9144253633
-
Double stuff security for beyond 30 wireless network
-
October
-
M. Kuroda, M. Yoshida and R. Ono, "Double Stuff Security for Beyond 30 Wireless Network", WPMC2003, V2, pp. 327-331, October 2003.
-
(2003)
WPMC2003
, vol.2
, pp. 327-331
-
-
Kuroda, M.1
Yoshida, M.2
Ono, R.3
-
20
-
-
84881195282
-
Public key cryptography for the financial services industry: Elliptic curve digital signature algorithm (ECDSA)
-
"Public Key Cryptography for the Financial Services Industry: Elliptic Curve Digital Signature Algorithm (ECDSA)", ANSI X9.62, 1999.
-
(1999)
ANSI X9.62
-
-
-
22
-
-
0003629991
-
-
NIST, FIPS 180-1, April
-
"Secure Hash Standard", NIST, FIPS 180-1, April 1995.
-
(1995)
Secure Hash Standard
-
-
-
23
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
IETF, February
-
H. Krawczyk, M. Bellare and R. Canetti, "HMAC: Keyed-hashing for Message Authentication", RFC 2104, IETF, February 1997.
-
(1997)
RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
24
-
-
4244000104
-
-
Draft Revised ITU-T Recommendation X.509, ISO/IEC 9594-8
-
"Public-key and Attribute Certificate Frameworks", Draft Revised ITU-T Recommendation X.509, ISO/IEC 9594-8, 2000.
-
(2000)
Public-key and Attribute Certificate Frameworks
-
-
-
25
-
-
84948391696
-
A model of certificate revocation
-
December
-
D.A. Cooper, "A Model of Certificate Revocation", in Proceedings of ACSAC '99, December 1999.
-
(1999)
Proceedings of ACSAC '99
-
-
Cooper, D.A.1
-
27
-
-
0003344055
-
X.509 internet public key infrastructure online certificate status protocol - OCSP
-
IETF, June
-
M. Myers, R. Ankney, A. Malpani, S. Galperin and C. Adams, "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP", RFC 2560, IETF, June 1999.
-
(1999)
RFC
, vol.2560
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
28
-
-
84957707067
-
Self-delegation with controlled propagation -or- what if you lose your laptop
-
Springer LNCS
-
O. Goldreich, B. Pftizmann and R.L. Rivest, "Self-Delegation with Controlled Propagation -or- What If You Lose Your Laptop", in Proceedings of Crypto 98, Springer LNCS, Vol. 1462, pp.153-168, 1998.
-
(1998)
Proceedings of Crypto 98
, vol.1462
, pp. 153-168
-
-
Goldreich, O.1
Pftizmann, B.2
Rivest, R.L.3
-
29
-
-
0003218526
-
Remote authentication dial in user service (RADIUS)
-
IETF, June
-
C. Rigney and S. Willens, "Remote Authentication Dial in User Service (RADIUS)", RFC 2865, IETF, June 2000.
-
(2000)
RFC
, vol.2865
-
-
Rigney, C.1
Willens, S.2
-
31
-
-
1642379048
-
EAP tunneled TLS authentication protocol (EAP-TTLS)
-
draft-ietf-pppext-eap-ttls-02.txt, November
-
P. Funk and S.B. Wilson, "EAP Tunneled TLS Authentication Protocol (EAP-TTLS)", Internet-Draft, draft-ietf-pppext-eap-ttls-02.txt, November 2002.
-
(2002)
Internet-draft
-
-
Funk, P.1
Wilson, S.B.2
-
32
-
-
9144237895
-
Interworking and handover mechanism between WLAN and UMTS
-
Artech House Publishers, November
-
M. Alam, "Interworking and Handover Mechanism between WLAN and UMTS", Wireless IP and Building the Mobile Internet, Artech House Publishers, November 2002.
-
(2002)
Wireless IP and Building the Mobile Internet
-
-
Alam, M.1
-
33
-
-
0003197824
-
IP Micro-mobility support using HAWAII
-
June
-
R. Ramjee, T. LaPorta, S. Thuel, K. Varadhan and L. Salgarelli, "IP Micro-Mobility Support Using HAWAII", Internet-Draft, June 1999.
-
(1999)
Internet-draft
-
-
Ramjee, R.1
LaPorta, T.2
Thuel, S.3
Varadhan, K.4
Salgarelli, L.5
-
34
-
-
9144268709
-
Fast handoffs for mobile IPv6
-
MIPv6 HandofT Design Team, draft-ietf-mobileip-fast-mipv6-01.txt, April
-
MIPv6 HandofT Design Team, "Fast Handoffs for Mobile IPv6", Internet-Draft, draft-ietf-mobileip-fast-mipv6-01.txt, April 2001.
-
(2001)
Internet-draft
-
-
-
35
-
-
0003651667
-
-
draft-ietf-mobileip-hmipv6-05.txt, July
-
H. Soliman, C. Castelluccia, K. Malki and L. Bellier, "Hierarchical MIPv6 Mobility Management", draft-ietf-mobileip-hmipv6-05.txt, July 2001.
-
(2001)
Hierarchical MIPv6 Mobility Management
-
-
Soliman, H.1
Castelluccia, C.2
Malki, K.3
Bellier, L.4
-
39
-
-
9144270299
-
A study on IP mobility service provisioning in cooperation with IEEE 802.1X authentication
-
MBL No. 24-009, March
-
H. Yokota, T. Kubo and A. Idoue, "A Study on IP Mobility Service Provisioning in Cooperation with IEEE 802.1X Authentication", IPSJ SIGNotes, MBL No. 24-009, March 2003.
-
(2003)
IPSJ SIGNotes
-
-
Yokota, H.1
Kubo, T.2
Idoue, A.3
-
42
-
-
0345427613
-
-
draft-le-aaa-mipv6-requirements-02.txt, April
-
S. Faccin, B. Patil, C. Perkins, F. Dupont, M. Maknavicius and J. Bournelle, "Mobile IPv6 Authentication, Authorization, and Accounting Requirements", draft-le-aaa-mipv6-requirements-02.txt, April 2003.
-
(2003)
Mobile IPv6 Authentication, Authorization, and Accounting Requirements
-
-
Faccin, S.1
Patil, B.2
Perkins, C.3
Dupont, F.4
Maknavicius, M.5
Bournelle, J.6
|