On Key Distribution and Authentication in Mobile Radio Networks
暂无分享,去创建一个
Kaoru Kurosawa | Choonsik Park | Tatsuaki Okamoto | Shigeo Tsujii | T. Okamoto | S. Tsujii | K. Kurosawa | Choonsik Park
[1] Gustavus J. Simmons,et al. A "Weak" Privacy Protocol using the RSA Crypto Algorithm , 1983, Cryptologia.
[2] Li-Fung Chang,et al. Privacy and authentication on a portable communications system , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.
[3] David Chaum,et al. Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .
[4] J. H. Moore. Protocol failures in cryptosystems , 1988, Proc. IEEE.
[5] Johan Håstad,et al. On Using RSA with Low Exponent in a Public Key Network , 1985, CRYPTO.
[6] Natsume Matsuzaki,et al. Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.