Secure-AKA: An Efficient AKA Protocol for UMTS Networks
暂无分享,去创建一个
[1] Abid Ali Minhas,et al. A Novel Security Algorithm for Universal Mobile Telecommunication System , 2010 .
[2] Colin Boyd,et al. Toward Non-parallelizable Client Puzzles , 2007, CANS.
[3] Ari Juels,et al. $evwu Dfw , 1998 .
[4] Neetesh Saxena,et al. A secure approach for SMS in GSM network , 2012, CUBE.
[5] Ratan K. Guha,et al. Discovering Man-in-the-Middle Attacks in Authentication Protocols , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[6] Mark John Taylor,et al. A Framework for the Forensic Investigation of Unstructured Email Relationship Data , 2011, Int. J. Digit. Crime Forensics.
[7] Guohong Cao,et al. Win-Coupon: An incentive framework for 3G traffic offloading , 2011, 2011 19th IEEE International Conference on Network Protocols.
[8] Chih-Ya Shen,et al. S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks , 2011, IEEE Transactions on Vehicular Technology.
[9] Asadollah Shahbahrami,et al. EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM , 2012 .
[10] Colin Boyd,et al. Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection , 2011, ICISC.
[11] Cheng-Chi Lee,et al. Extension of an Efficient 3GPP Authentication and Key Agreement Protocol , 2013, Wirel. Pers. Commun..
[12] Alberto Peinado,et al. Privacy and authentication protocol providing anonymous channels in GSM , 2004, Comput. Commun..
[13] Neetesh Saxena,et al. NS-AKA: An Improved and Efficient AKA Protocol for 3G (UMTS) Networks , 2014 .
[14] Muxiang Zhang,et al. Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol , 2003, IACR Cryptol. ePrint Arch..
[15] Samir Ranjan Das,et al. Moving bits from 3G to metro-scale WiFi for vehicular network access: An integrated transport layer solution , 2011, 2011 19th IEEE International Conference on Network Protocols.
[16] Douglas Stebila,et al. Towards Denial-of-Service-Resilient Key Agreement Protocols , 2009, ACISP.
[17] Neeli R. Prasad,et al. Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks , 2011, Int. J. Digit. Crime Forensics.
[18] Dapeng Wu,et al. An Efficient Mobile Authentication Scheme for Wireless Networks , 2008, IEEE Transactions on Wireless Communications.
[19] Yuguang Fang,et al. Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..
[20] Jung-Wen Lo,et al. Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol , 2010, Int. J. Netw. Secur..
[21] Wu-chi Feng,et al. Design and implementation of network puzzles , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[22] Chun-I Fan,et al. Nested One-Time Secret Mechanisms for Fast Mutual Authentication in Mobile Communications , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[23] T. Hamano,et al. A redirection-based defense mechanism against flood-type attacks in large-scale ISP networks , 2004, APCC/MDMC '04. The 2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceeding.
[24] Min-Shiang Hwang,et al. A cocktail protocol with the Authentication and Key Agreement on the UMTS , 2010, J. Syst. Softw..
[25] Taieb Znati,et al. A Guided Tour Puzzle for Denial of Service Prevention , 2009, 2009 Annual Computer Security Applications Conference.
[26] Peter Sweeney,et al. Simple authenticated key agreement algorithm , 1999 .
[27] Neetesh Saxena,et al. SecureSMS: A secure SMS protocol for VAS and other applications , 2014, J. Syst. Softw..
[28] K. P. Lam,et al. On the Performance of Li's Unsupervised Image Classifier and the Optimal Cropping Position of Images for Forensic Investigations , 2011, Int. J. Digit. Crime Forensics.
[29] Chung-Ming Huang,et al. Authentication and key agreement protocol for UMTS with low bandwidth consumption , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[30] Yi-Bing Lin,et al. One-pass GPRS and IMS authentication procedure for UMTS , 2005, IEEE Journal on Selected Areas in Communications.
[31] Ulrike Meyer,et al. A man-in-the-middle attack on UMTS , 2004, WiSe '04.
[32] Yin Xu,et al. Dynamic regulation of mobile 3G/HSPA uplink buffer with Receiver-side Flow Control , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[33] Yuefei Zhu,et al. Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS , 2010, IEEE Communications Letters.
[34] Min-Shiang Hwang,et al. The UMTS-AKA Protocols for Intelligent Transportation Systems , 2009, EURASIP J. Wirel. Commun. Netw..
[35] Sufian Yousef,et al. A New Authentication Protocol for UMTS Mobile Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[36] Colin Boyd,et al. Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols , 2011, CT-RSA.
[37] Hsiao-Hwa Chen,et al. A Selective Downlink Scheduling Algorithm to Enhance Quality of VOD Services for WAVE Networks , 2009, EURASIP J. Wirel. Commun. Netw..
[38] B. Sathish Babu,et al. A Dynamic Authentication Scheme for Mobile Transactions , 2009, Int. J. Netw. Secur..
[39] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[40] Georgios Kambourakis,et al. Signaling-Oriented DoS Attacks in UMTS Networks , 2009, ISA.