An efficient authentication protocol supporting privacy in mobile computing environments
暂无分享,去创建一个
[1] Paul Francis,et al. Fast routing table lookup using CAMs , 1993, IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings.
[2] Colin Boyd,et al. Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , 1998, ACISP.
[3] Daxiao Yu,et al. Forwarding engine for fast routing lookups and updates , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).
[4] Jung-Joon Kim,et al. Security requirements of next generation wireless communications , 1998, ICCT'98. 1998 International Conference on Communication Technology. Proceedings (IEEE Cat. No.98EX243).
[5] Chia-Tai Chan,et al. A fast IP routing lookup scheme , 2001, IEEE Communications Letters.
[6] W.-S. Juang,et al. Anonymous channel and authentication in wireless communications , 1999, Comput. Commun..
[7] Bill Warner. Book Review: Interconnections: Bridges and Routers by Radia Perlman (Addison-Wesley Publishing Company, Inc.) , 1993, CCRV.
[8] Butler W. Lampson,et al. IP lookups using multiway and multicolumn search , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[9] Nick McKeown,et al. Routing lookups in hardware at memory access speeds , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[10] A. Mehrotra,et al. Mobility and security management in the GSM system and some proposed future improvements , 1998, Proc. IEEE.
[11] G Pierce,et al. Recent Developments in Digital Wireless Network Security , 1996 .
[12] George Varghese,et al. Memory-efficient state lookups with fast updates , 2000, SIGCOMM 2000.
[13] Gene Tsudik,et al. KryptoKnight Authentication and Key Distribution System , 1992, ESORICS.
[14] Radia Perlman. Interconnections: Bridges and Routers , 1992 .
[15] Chi-Chun Lo,et al. Secure communication mechanisms for GSM networks , 1999, IEEE Trans. Consumer Electron..
[16] Svante Carlsson,et al. Small forwarding tables for fast routing lookups , 1997, SIGCOMM '97.
[17] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[18] Farnam Jahanian,et al. Internet routing instability , 1997, SIGCOMM '97.
[19] Chang-Seop Park. On certificate-based security protocols for wireless mobile communication systems , 1997 .
[20] G. Tsudik,et al. Authentication of mobile users , 1994, IEEE Network.
[21] Hugo Krawczyk,et al. Security issues in a CDPD wireless network , 1995, IEEE Wirel. Commun..