Improving the WTLS by means of Kerberos
暂无分享,去创建一个
Hui Li | Mei Guo | Jing-yi Li | Wen-li Chen | Wenli Chen | Mei Guo | Jing-yi Li | Hui Li
[1] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[2] Albert Levi,et al. Performance evaluation of public-key cryptosystem operations in WTLS protocol , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[3] Daniel A. Menascé,et al. Performance of public-key-enabled Kerberos authentication in large networks , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[4] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[5] Larry Zhu,et al. Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) , 2006, RFC.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Kwangjo Kim,et al. Wireless Authentication Protocol Preserving User Anonymity , 2001 .
[8] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[9] Semih Bilgen,et al. Wireless application protocol transport layer performance , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[10] JaeCheol Ha,et al. A WTLS Handshake Protocol with User Anonymity and Forward Secrecy , 2002, CDMA International Conference.
[11] KnutWoller,et al. After the First Five Years:Central Linux Support at DESY , 2001 .
[12] Daniel A. Menascé,et al. The performance of public key-enabled kerberos authentication in mobile computing applications , 2001, CCS '01.
[13] K. Ramasamy,et al. Security issues in WAP WTLS protocol , 2002, IEEE 2002 International Conference on Communications, Circuits and Systems and West Sino Expositions.
[14] Matthew J. B. Robshaw,et al. A Note on the Security of the OAEP-Enhanced RSA Public-Key Encryption Scheme , 1999 .