Ticket based service access for the mobile user
暂无分享,去创建一个
[1] Jennifer Widom,et al. Efficient and flexible location management techniques for wireless communication systems , 1996, MobiCom '96.
[2] M. Rahnema,et al. Overview of the GSM system and protocol architecture , 1993, IEEE Communications Magazine.
[3] Charles E. Perkins,et al. IP Mobility Support , 1996, RFC.
[4] D. Everett. Cowry shell to smart card [electronic cash] , 1997 .
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[7] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[8] Marvin Theimer,et al. Customizing Mobile Applications , 1993, Symposium on Mobile and Location-Independent Computing.
[9] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[10] Tomasz Imielinski,et al. Mobile wireless computing: challenges in data management , 1994, CACM.
[11] Bill N. Schilit,et al. An overview of the PARCTAB ubiquitous computing experiment , 1995, IEEE Wirel. Commun..
[12] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[13] Stuart K. Williams,et al. The IrDA platform , 1998 .
[14] D.G.W. Birch,et al. Closing the loop-payment on demand for interactive services , 1995 .