Efficient and Secure Authentication and Key Agreement Protocol
暂无分享,去创建一个
[1] Sangjin Kim,et al. A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy , 2007, ICCSA.
[2] Lein Harn,et al. On the security of wireless network access with enhancements , 2003, WiSe '03.
[3] Shiuh-Pyng Shieh,et al. Chain authentication in mobile communication systems , 2000, Telecommun. Syst..
[4] Yuguang Fang,et al. Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..
[5] Cheng-Chi Lee,et al. A remote user authentication scheme using hash functions , 2002, OPSR.
[6] Min-Shiang Hwang,et al. On the security of an enhanced UMTS authentication and key agreement protocol , 2011, Eur. Trans. Telecommun..
[7] Mark Looi. Enhanced authentication services for Internet systems using mobile networks , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[8] Cheng-Chi Lee,et al. Extension of authentication protocol for GSM , 2003 .
[9] Chung-Ming Huang,et al. Authentication and key agreement protocol for UMTS with low bandwidth consumption , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[10] Perumal Dananjayan,et al. Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network , 2010, ArXiv.
[11] Wen-Shenq Juang,et al. Efficient 3GPP Authentication and Key Agreement with Robust User Privacy Protection , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[12] He Yijun,et al. A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications , 2007 .
[13] Yan Zhang,et al. Security Management in the Next Generation Wireless Networks , 2006, Int. J. Netw. Secur..
[14] Günther Horn,et al. Authentication protocols for mobile network environment value-added services , 2002, IEEE Trans. Veh. Technol..
[15] Somayeh Salimi,et al. An Extended Authentication and Key Agreement Protocol of UMTS , 2009, ISPEC.
[16] Yi-Bing Lin,et al. Reducing authentication signaling traffic in third-generation mobile network , 2003, IEEE Trans. Wirel. Commun..
[17] Chih-Ya Shen,et al. Provable Secure AKA Scheme with Reliable Key Delegation in UMTS , 2009, 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement.
[18] Muxiang Zhang,et al. Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol , 2003, IACR Cryptol. ePrint Arch..
[19] Sufian Yousef,et al. A New Authentication Protocol for UMTS Mobile Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[20] S.M. Musa,et al. Low complexity image authentication for mobile applications , 2007, Proceedings 2007 IEEE SoutheastCon.
[21] Shiuh-Pyng Shieh,et al. Designing Authentication Protocols for Third Generation Mobile Communication Systems , 2005, J. Inf. Sci. Eng..
[22] Sufian Yousef,et al. Analytical model for authentication transmission overhead between entities in mobile networks , 2007, Comput. Commun..