Key Establishment Protocols for Secure Mobile Communications: A Selective Survey
暂无分享,去创建一个
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[4] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[5] Natsume Matsuzaki,et al. Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.
[6] Klaus Vedder. Security Aspects of Mobile Communications , 1991, Computer Security and Industrial Cryptography.
[7] Yacov Yacobi,et al. Security for personal communications services: public-key vs. private key approaches , 1992, [1992 Proceedings] The Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[8] Kaoru Kurosawa,et al. On Key Distribution and Authentication in Mobile Radio Networks , 1994, EUROCRYPT.
[9] M. Beller,et al. Fully-fledged two-way public key authentication and key agreement for low-cost terminals , 1993 .
[10] Yacov Yacobi,et al. Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..
[11] Ashar Aziz,et al. Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.
[12] Catherine A. Meadows,et al. Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.
[13] Ulf Carlsen. Optimal privacy and authentication on a portable communications system , 1994, OPSR.
[14] Yi Mu,et al. Design of Secure End-toEnd Protocols for Mobile Systems , 1996, IFIP World Conference on Mobile Communications.
[15] Yi Mu,et al. On the design of security protocols for mobile communications , 1996, ACISP.
[16] Roger M. Needham. The changing environment for security protocols , 1997 .