暂无分享,去创建一个
[1] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Cheng-Chi Lee,et al. Extension of authentication protocol for GSM , 2003 .
[4] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Laurent Imbert,et al. Fast Elliptic Curve Point Multiplication using Double-Base Chains , 2005, IACR Cryptol. ePrint Arch..
[7] Juan Melero,et al. GSM, GPRS and EDGE Performance: Evolution Toward 3G/UMTS , 2002 .
[8] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[9] Colin Boyd,et al. Public key protocols for wireless communications , 1998, ICISC.
[10] Iakovos S. Venieris,et al. Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration , 2003, Mob. Networks Appl..
[11] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[12] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[13] Yacov Yacobi,et al. On Key Distribution Systems , 1989, CRYPTO.
[14] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[15] Chang-Seop Park. On certificate-based security protocols for wireless mobile communication systems , 1997 .
[16] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[17] M. Beller,et al. Fully-fledged two-way public key authentication and key agreement for low-cost terminals , 1993 .