An Asymmetric Authentication Protocol for Mobile Hand held Devices using ECC over Point Multiplication Method
暂无分享,去创建一个
[1] Chi-Chun Lo,et al. Secure communication mechanisms for GSM networks , 1999, IEEE Trans. Consumer Electron..
[2] M. Rahnema,et al. Overview of the GSM system and protocol architecture , 1993, IEEE Communications Magazine.
[3] R. Badlishah Ahmad,et al. Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers , 2008 .
[4] 1 Elliptic Curve Cryptography 3 . 1 Elliptic Curve Cryptography , 2014 .
[5] Hung-Yu Lin. Security and authentication in PCS , 1999 .
[6] Tzonelih Hwang,et al. Private Authentication Techniques for the Global Mobility Network , 2005, Wirel. Pers. Commun..
[7] Dapeng Wu,et al. An Efficient Mobile Authentication Scheme for Wireless Networks , 2008, IEEE Transactions on Wireless Communications.
[8] Lein Harn,et al. Authentication protocols with nonrepudiation services in personal communication systems , 1999, IEEE Communications Letters.
[9] Kiyomichi Araki,et al. Overview of Elliptic Curve Cryptography , 1998, Public Key Cryptography.
[10] S. Prasanna Ganesan. An Authentication Protocol For Mobile Devices Using Hyperelliptic Curve Cryptography , 2010 .
[11] Wei-Bin Lee,et al. A new delegation-based authentication protocol for use in portable communication systems , 2005, IEEE Transactions on Wireless Communications.
[12] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.
[13] Marisa W. Paryasto,et al. Issues in Elliptic Curve Cryptography Implementation , 2009 .
[14] Yacov Yacobi,et al. Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..
[15] Tzonelih Hwang,et al. Enhanced delegation-based authentication protocol for PCSs , 2009, IEEE Transactions on Wireless Communications.