A NOVEL PROTOCOL FOR INDIRECT AUTHENTICATION IN MOBILE NETWORKS BASED ON ELLIPTIC CURVE CRYPTOGRAPHY
暂无分享,去创建一个
[1] Vijay K. Garg,et al. Wireless and Personal Communications Systems , 2000 .
[2] Vipul Gupta,et al. Speeding up Secure Web Transactions Using Elliptic Curve Cryptography , 2004, NDSS.
[3] Dharmendra Sharma,et al. Quantum Key Distribution for Wi-Fi Network Security , 2008 .
[4] 张友坤,et al. A Security Architecture for Mobile Ad Hoc Networks , 2005 .
[5] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[6] Hala ElAarag,et al. Improving TCP performance over mobile networks , 2002, CSUR.
[7] Kenji Takahashi,et al. Implementing identity provider on mobile phone , 2007, DIM '07.
[8] Chris McDonald,et al. Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.
[9] K. Thilagavathi,et al. An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks , 2009 .
[10] Michele Bugliesi,et al. Principles for Entity Authentication , 2003, Ershov Memorial Conference.
[11] Armando Fox,et al. Security on the move: indirect authentication using Kerberos , 1996, MobiCom '96.
[12] Ibrahim Sogukpinar,et al. SIP Authentication Scheme using ECDH , 2007 .
[13] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[14] V. Vijayalakshmi,et al. Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks , 2008 .
[15] Vipul Gupta,et al. Integrating elliptic curve cryptography into the web's security infrastructure , 2004, WWW Alt. '04.
[16] Manuel Barbosa,et al. Compiler Assisted Elliptic Curve Cryptography , 2007, IACR Cryptol. ePrint Arch..
[17] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[18] Sehyun Park,et al. Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications , 2003, ACISP.
[19] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[20] Gunter Saake,et al. User authentication in multidatabase systems , 1998, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130).
[21] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[22] Sufian Yousef,et al. Analytical model for authentication transmission overhead between entities in mobile networks , 2007, Comput. Commun..