EEE-GSM: End-to-End Encryption Scheme over GSM System
暂无分享,去创建一个
Fagen Li | Chunxiang Xu | Mohammed Ramadan | Guohong Du | Chunxiang Xu | Fagen Li | M. Ramadan | Guo-hong Du
[1] Alexander W. Dent,et al. On Proofs of Security for Certificateless Cryptosystems , 2005, IACR Cryptol. ePrint Arch..
[2] Luca Veltri,et al. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview , 2013, Algorithms.
[3] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[4] Kyung Sup Kwak,et al. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.
[5] Fagen Li,et al. User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System , 2016, Int. J. Netw. Secur..
[6] Fagen Li,et al. An efficient end-to-end mutual authentication scheme for 2G-GSM system , 2016, 2016 IEEE International Conference on Big Data Analysis (ICBDA).
[7] Eli Biham,et al. Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, Journal of Cryptology.
[8] S. Goswami,et al. Enhancement of GSM Security Using Elliptic Curve Cryptography Algorithm , 2012, 2012 Third International Conference on Intelligent Systems Modelling and Simulation.
[9] Alex Biryukov,et al. Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.
[10] Fagen Li,et al. Authentication and key agreement scheme for CDMA cellular system , 2015, 2015 IEEE International Conference on Communication Software and Networks (ICCSN).
[11] Alexander Maximov,et al. An Improved Correlation Attack on A5/1 , 2004, Selected Areas in Cryptography.
[12] Jan C. A. van der Lubbe,et al. Basic Methods of Cryptography , 1998 .
[13] Danfeng Yao,et al. Applications and Security of Next-Generation, User-Centric Wireless Systems , 2010, Future Internet.
[14] D. Drajic,et al. Application-layer security mechanism for M2M communication over SMS , 2012, 2012 20th Telecommunications Forum (TELFOR).
[15] Alberto Peinado,et al. Privacy and authentication protocol providing anonymous channels in GSM , 2004, Comput. Commun..
[16] Zheng Wang,et al. An improved attack on clock-controlled shift registers based on hardware implementation , 2012, Science China Information Sciences.
[17] Francesco Vatalaro,et al. Performance evaluation of GSM robustness against smart jamming attacks , 2012, 2012 5th International Symposium on Communications, Control and Signal Processing.