Evaluation of UMTS security architecture and services
暂无分享,去创建一个
[1] Tetsu Iwata,et al. New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms , 2004, FSE.
[2] Iakovos S. Venieris,et al. Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration , 2003, Mob. Networks Appl..
[3] Flemming Nielson,et al. Security for Mobility , 2002, FOSAD.
[4] Mark Blunden,et al. Related Key Attacks on Reduced Round KASUMI , 2001, FSE.
[5] Lazaros F. Merakos,et al. Security in third Generation Mobile Networks , 2004, Comput. Commun..
[6] Mitsuru Matsui,et al. New Block Encryption Algorithm MISTY , 1997, FSE.
[7] Geir M. Køien,et al. Access security in CDMA2000, including a comparison with UMTS access security , 2004, IEEE Wireless Communications.
[8] Marine Minier,et al. New Results on the Pseudorandomness of Some Blockcipher Constructions , 2001, FSE.
[9] Kaisa Nyberg. CRYPTOGRAPHIC ALGORITHMS FOR UMTS , 2004 .
[10] Chris J. Mitchell,et al. An analysis of the 3gpp-MAC scheme , 2001, Electron. Notes Discret. Math..
[11] Ulrich Kühn,et al. Improved Cryptanalysis of MISTY1 , 2002, FSE.
[12] Chris J. Mitchell,et al. Heterogeneous Internet Access via PANA / UMTS , 2004 .
[13] Hahnsang Kim,et al. Improving mobile authentication with new AAA protocols , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[14] G.M. Koien,et al. An introduction to access security in UMTS , 2004, IEEE Wireless Communications.
[15] Georgios Kambourakis,et al. Performance Evaluation of Public Key-Based Authentication in Future Mobile Communication Systems , 2004, EURASIP J. Wirel. Commun. Netw..
[16] Ulrich Kühn,et al. Cryptanalysis of Reduced-Round MISTY , 2001, EUROCRYPT.
[17] Steve Babbage,et al. On MISTY1 Higher Order Differential Cryptanalysis , 2000, ICISC.
[18] Ulrike Meyer,et al. A man-in-the-middle attack on UMTS , 2004, WiSe '04.
[19] Toshinobu Kaneko,et al. On the Strength of KASUMI without FL Functions against Higher Order Differential Attack , 2000, ICISC.
[20] Jari Arkko,et al. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) , 2006, RFC.