Efficient 3GPP Authentication and Key Agreement with Robust User Privacy Protection
暂无分享,去创建一个
[1] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[2] James H. Burrows,et al. Secure Hash Standard , 1995 .
[3] Peter Sweeney,et al. Simple authenticated key agreement algorithm , 1999 .
[4] Paul F. Syverson,et al. A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.
[5] Ashar Aziz,et al. Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.
[6] Yuguang Fang,et al. Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..
[7] Chin-Chen Chang,et al. Efficient authentication protocols of GSM , 2005, Comput. Commun..
[8] Yacov Yacobi,et al. Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..
[9] Min-Shiang Hwang,et al. Cryptanalysis of Simple Authenticated Key Agreement Protocols , 2004 .
[10] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] Wen-Shenq Juang. Efficient User Authentication and Key Agreement in Ubiquitous Computing , 2006, ICCSA.
[12] Young Jae Choi,et al. An Improvement on Privacy and Authentication in GSM , 2004, WISA.
[13] Paul Syverson,et al. A Taxonomy of Replay Attacks , 1994 .
[14] Shiuh-Jeng Wang,et al. Anonymous wireless authentication on a portable cellular mobile system , 2004, IEEE Transactions on Computers.
[15] M. Beller,et al. Fully-fledged two-way public key authentication and key agreement for low-cost terminals , 1993 .