A new privacy and authentication protocol for end-to-end mobile users
暂无分享,去创建一个
[1] Yacov Yacobi,et al. Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..
[2] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[3] Wei-Pang Yang,et al. Enhanced privacy and authentication for the global system for mobile communications , 1999, Wirel. Networks.
[4] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[5] Yuliang Zheng. An Authentication and Security Protocol for Mobile Computing , 1996, IFIP World Conference on Mobile Communications.
[6] Chris J. Mitchell,et al. Comments on an optimized protocol for mobile network authentication and security , 1999, MOCO.
[7] B. H. Yae,et al. A scheduling scheme for the heterogeneous multimedia services in mobile broadband systems , 1997, Proceedings of 8th International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC '97.
[8] Min-Shiang Hwang,et al. Conference key distribution protocols for digital mobile communication systems , 1995 .
[9] Stephen Hayes. A standard for the OAM&P of PCS systems. , 1994, IEEE Personal Communications.
[10] Xun Yi,et al. An optimized protocol for mobile network authentication and security , 1998, MOCO.
[11] Ashar Aziz,et al. Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.
[12] Min-Shiang Hwang,et al. Authenticated key-exchange in a mobile radio network , 1997, Eur. Trans. Telecommun..
[13] Cheng-Chi Lee,et al. An Improvement of Mobile Users Authentication in the Integration Environments , 2002 .
[14] Wei-Pang Yang,et al. Conference Key Distribution Schemes for Secure Digital Mobile Communications , 1995, IEEE J. Sel. Areas Commun..