Privacy enhanced cellular access security
暂无分享,去创建一个
[1] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[2] Hannes Federrath,et al. Location management strategies increasing privacy in mobile communication , 1996, SEC.
[3] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[4] Jörn Müller-Quade,et al. Initiator-Resilient Universally Composable Key Exchange , 2003, ESORICS.
[5] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Kwangjo Kim,et al. Wireless Authentication Protocol Preserving User Anonymity , 2001 .
[8] Valtteri Niemi,et al. UMTS security , 2003 .
[9] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[10] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[11] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[12] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[13] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[14] Hannes Federrath,et al. MIXes in Mobile Communication Systems: Location Management with Privacy , 1996, Information Hiding.
[15] N. Asokan,et al. Untraceability in mobile networks , 1995, MobiCom '95.
[16] M. Satyanarayanan. Workshop on Mobile Computing Systems and Applications December 1994 , 1994, Workshop on Mobile Computing Systems and Applications.
[17] G.M. Koien,et al. An introduction to access security in UMTS , 2004, IEEE Wireless Communications.
[18] Vladiinir A. Oleshchuk. Spatio-Temporal Exposure Control An investigation of spatial home control and location privacy preserving issues , 2003 .
[19] Vladimir A. Oleshchuk,et al. Location Privacy for Cellular Systems; Analysis and Solution , 2005, Privacy Enhancing Technologies.
[20] N. Asokan,et al. Anonymity in a Mobile Computing Environment , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[21] Hugo Krawczyk,et al. Untraceable mobility or how to travel incognito , 1999, Comput. Networks.