Provably secure and efficient authentication techniques for the global mobility network
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. A self-encryption mechanism for authentication of roaming and teleconference services , 2003, IEEE Trans. Wirel. Commun..
[2] C.-H. Wu,et al. Localised authentication for inter-network roaming across wireless LANs , 2004 .
[3] Tzonelih Hwang,et al. Private Authentication Techniques for the Global Mobility Network , 2005, Wirel. Pers. Commun..
[4] Li Gong,et al. Efficient network authentication protocols: Lower bounds and optimal implementations , 1995, Distributed Computing.
[5] Wei-Bin Lee,et al. A new delegation-based authentication protocol for use in portable communication systems , 2005, IEEE Transactions on Wireless Communications.
[6] Shigefusa Suzuki,et al. An Authentication Technique Based on Distributed Security Management for the Global Mobility Network , 1997, IEEE J. Sel. Areas Commun..
[7] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[8] David L. Mills,et al. Adaptive hybrid clock discipline algorithm for the network time protocol , 1998, TNET.
[9] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[10] David L. Mills,et al. Precision synchronization of computer network clocks , 1994, CCRV.
[11] Edgar Nett,et al. Clock synchronization for wireless local area networks , 2000, Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000.
[12] Shahrokh Saeednia,et al. A note on Girault's self-certified model , 2003, Inf. Process. Lett..
[13] Levente Buttyán,et al. Extensions to an authentication technique proposed for the global mobility network , 2000, IEEE Trans. Commun..
[14] Li Gong,et al. A security risk of depending on synchronized clocks , 1992, OPSR.
[15] Tzong-Chen Wu,et al. Improvement of Saeednia's self-certified key exchange protocols , 1998 .
[16] Xuemin Shen,et al. Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks , 2006, IEEE Transactions on Wireless Communications.
[17] Shahrokh Saeednia. Identity-Based and Self-Certified Key-Exchange Protocols , 1997, ACISP.
[18] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[19] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.