AKA Protocols for Mobile Communications
暂无分享,去创建一个
[1] Yacov Yacobi,et al. Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..
[2] H. Petersen,et al. Cryptanalysis and improvement of signcryption schemes , 1998 .
[3] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[4] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[5] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[6] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[7] Ted Y. Joseph. Personal communication services , 1992 .
[8] Sang-Jae Moon,et al. A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications , 1999, ICISC.
[9] JooSeok Song,et al. Information Security and Cryptology - ICISC’99 , 1999, Lecture Notes in Computer Science.
[10] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[11] S-W Lee,et al. Biologically Motivated Computer Vision , 2000, Lecture Notes in Computer Science.
[12] Yuliang Zheng. An Authentication and Security Protocol for Mobile Computing , 1996, IFIP World Conference on Mobile Communications.
[13] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[14] M. Beller,et al. Fully-fledged two-way public key authentication and key agreement for low-cost terminals , 1993 .
[15] Robert H. Deng,et al. A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.
[16] Kwangjo Kim,et al. Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme , 1999, ICISC.
[17] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[18] Ulf Carlsen. Optimal privacy and authentication on a portable communications system , 1994, OPSR.
[19] Dieter Gollmann,et al. Computer Security — ESORICS 98 , 1998, Lecture Notes in Computer Science.
[20] Yuliang Zheng,et al. Encrypted Message Authentication by Firewalls , 1999, Public Key Cryptography.
[21] Colin Boyd,et al. Forward Secrecy and Its Application to Future Mobile Communications Security , 2000, Public Key Cryptography.
[22] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[23] Günther Horn,et al. Authentication and Payment in Future Mobile Systems , 1998, J. Comput. Secur..
[24] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .