|
[1] Mustafa Al-Fayoumi, Shadi Nashwan, Sufian Yousef and Abdel-Rahman Alzoubaidi, “New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks,” The Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications 2007 (WiMOB’07), pp. 29-29, 2007. [2] Boaz Barak, “Constant-round coin-tossing with a man in the middle or realizing the shared random string model,” The Proceedings of The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002, pp. 345-355, 2002. [3] Mihir Bellare and Phillip Rogaway, “Entity Authentication and Key Distribution” , In Proceedings of Advances in Cryptology CRYPTO 93, vol. 773, pp. 232-249, 1993. [4] Li Gong, “A Security Risk of Depending on Synchronized Clocks,” ACM SIGOPS Operating Systems Review, vol. 26, pp. 49-53, 1992. [5] Li Gong, “Variations on the Themes of Message Freshness and Replay or, the Difficulty of Devising Formal Methods to Analyze Cryptographic Protocols,” In Proceedings of the Computer Security Foundations Workshop VI, pp. 131-136, 1993. [6] Wen-Shenq Juang and Jing-Lin Wu, “Efficient 3GPP Authentication and Key Agreement with Robust User Privacy Protection,” IEEE Wireless Communications and Networking Conference 2007 (WCNC ’07), pp. 2720-2725, 2007. [7] Wen-Shenq Juang and Jing-Lin Wu, “Two Efficient Two-Factor Authenticated Key Exchange Protocols in PublicWireless LANs,” Computers and Electrical Engineering, vol. 35, pp. 33-40, 2009. [8] Daeyoung Kim, Younggang Cui, Sangjin Kim, and Heekuck Oh, “A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy,” Computational Science and Its Applications, ICCSA 2007, vol. 4706, pp. 987-995, 2007. [9] Taekyoung Kwon and Jooseok Song, “Clarifying Straight Replays and Forced Delays,” ACM SIGOPS Operating Systems Review, vol. 33, no. 1, pp. 47-52, 1999. [10] Kristin Lauter, “The Advantages of Elliptic Curve Cryptography for Wireless Security,” IEEE Wireless Communications, vol. 11, no. 1, pp. 62-67, 2004. [11] Alfred J. Menezes, Paul C. Van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, 5th, 2001. [12] Paul Syverson, “A Taxonomy of Replay Attacks,” In Proceedings of Computer Security Foundations Workshop VII, 1994, pp. 187-191, 1994. [13] Muxiang Zhang and Yuguang Fang, “Security analysis and enhancements of 3GPP authentication and key agreement protocol,” IEEE Transactions on Wireless Communications, vol. 4, no. 2, pp. 734-742, 2005. [14] 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3G Security, “Security Architecture 4.2.0,” Release 4, 3GPP TS 33.102, 2001. [15] 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3G Security, “Security Threats and Requirements,” version 4.1.0, 3GPP TS 21.133, 2001.
|