A wireless-based authentication and anonymous channels for large scale area
暂无分享,去创建一个
[1] Yacov Yacobi,et al. Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] M. Beller,et al. Fully-fledged two-way public key authentication and key agreement for low-cost terminals , 1993 .
[4] N. Asokan,et al. Untraceability in mobile networks , 1995, MobiCom '95.
[5] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[6] Shoji Miyaguchi,et al. The FEAL Cipher Family , 1990, CRYPTO.
[7] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[8] David M'Raïhi,et al. Cryptographic smart cards , 1996, IEEE Micro.
[9] Ulf Carlsen. Optimal privacy and authentication on a portable communications system , 1994, OPSR.
[10] Birgit Pfitzmann,et al. Breaking Efficient Anonymous Channel , 1994, EUROCRYPT.
[11] W.-S. Juang,et al. Anonymous channel and authentication in wireless communications , 1999, Comput. Commun..
[12] Kaoru Kurosawa,et al. Efficient Anonymous Channel and All/Nothing Election Scheme , 1994, EUROCRYPT.
[13] Liu Jianwei,et al. A user authentication protocol for digital mobile communication network , 1995, Proceedings of 6th International Symposium on Personal, Indoor and Mobile Radio Communications.
[14] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[15] Miles E. Smid,et al. The Data Encryption Standard , 1988 .