|
Reference[1] A. T. Khalid and A. Ali, “A new authentication protocol for Roaming users in GSM Network,” IEEE International Symposium on Computers and Communications Proceedings, pp.93-98, 1999.[2] V. Bharghavan and C. V. Ramamoorthy, “Security Issues in Mobile Communications,” Second International Symposium on Autonomous Decentralized Systems Proceedings. ISADS 95, pp.19-24, 1995.[3] J. Liu and Y. Wang, “A User Authentication Protocol for Digital Mobile Communication Network,” Wireless: Personal, Indoor and Mobile Radio Communications Merging onto the Information Superhighway, PIMRC''95. Sixth IEEE International Symposium , Vol.2 , pp.608-612, 1995. [4] W. Stallings, Cryptography and network security principles and practice, 2nd ed, Prentice Hall, Inc, 1999.[5] ETSI TS 133.120. “3G Security”, http://www.etsi.org/ [6] ETSI TS 21.133.”Security Threats and Requirements, http://www.etsi.org/ [7] C. S. Park, “On certificate-based security protocols for wireless mobile communication systems,” IEEE Network, Vol.115, pp.28-32, Oct 1997.[8] N Jefferies, “Security in third-generation mobile systems,” IEEE Colloquium on Security in Network, pp.8/1-8/5, 1995.[9] C. Metz, “AAA protocols: authentication, authorization, and accounting for the Internet,” IEEE Internet Computing, Vol.36, pp. 75-79, Nov.-Dec. 1999.[10] S. Putz, R. Schmitz and F. Tonsing, “Authentication schemes for third generation mobile radio systems,” The Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Vol. 1, pp.126-130, 1998.[11] S. M. Yen, “Cryptanalysis of an authentication and key distribution protocol,” IEEE Communications Letters, Vol.31, pp.7-8, Jan 1999.[12] Z. Zheng, N. Zhang, “Dynamic Authentication Protocol for Personal Communication System (PCS),” International Conference on Communication Technology, ICCT’98, Beijing, China, pp.7-1-7-5, Oct 1998.[13] V. Varadharajan and M. Yi, “Preserving privacy in mobile communications: a hybrid method,” IEEE International Conference on Personal Wireless Communications, pp.532-536, 1997.[14] B.Askwith, M. Merabti, Qi Shi, K. Whiteley, “Achieving user privacy in mobile networks,” Proceedings of the 13th Annual Computer Security Applications Conference, pp.108-116, 1997.[15] R. Bird, I. Gopal, A. Herzberg, P. A. Janson, S. Kutten, R. Molva, M. Yung, “Systematic design of a family of attack-resistant authentication protocols,” IEEE Journal on Selected Areas in Communications, Vol.115, pp.679-693, June 1993.[16] T. G. Brutch and P. C. Brutch, “Mutual Authentication, Confidentiality, and Key MANagement (MACKMAN) system for mobile computing and wireless communication,” Proceedings of the 14th Annual Computer Security Applications Conference, pp. 308-317, 1998.[17] L. Gong, M.A. Lomas, R.M. Needham, J.H. Saltzer, “Protecting poorly chosen secrets from guessing attacks,” IEEE Journal on Selected Areas in Communications, Vol.115, pp.648-656, June 1993.[18] S. Keung and K. Y. Siu, “Efficient protocols secure against guessing and replay attacks,” Proceedings of the Fourth International Conference on Computer Communications and Networks, pp.105-112, 1995.[19] T. Kwon and J. Song, “Authenticated key exchange protocols resistant to password guessing attacks,” IEEE Proceedings of Communications , Vol.1455, pp.304-308, Oct 1998.[20] G. Li, “Optimal authentication protocols resistant to password guessing attacks,” Proceedings of the Eighth IEEE Computer Security Foundations Workshop, pp.24-29, 1995.[21] S. P. Shieh, W. H. Yang and H. M. Sun, “An authentication protocol without trusted third party,” IEEE Communications Letters, Vol.13, pp.87-89, May 1997.[22] K. Heikki, A. Ari, N. Valtteri, L. Lauri, N. Siamak, UMTS Network: Architecture, Mobility and Services, Wiley, Inc, 2001. [23] J. Rapeli, “UMTS: targets, system concept, and standardization in a global framework,” IEEE Personal Communications, Vol.2(1), pp.20-28, Feb 1995.[24] Y. B. Lin, “Mobility management for PCS,” Tutorial: First Workshop on Mobile Computing, Applied Research, Bellcore Morristown, NJ, USA, 1995.[25] 賴溪松, 韓亮, 張真誠, 近代密碼學及其應用, 松岡電腦圖書, 1994.[26]Y. B. Lin, “ No wires attached,” IEEE Potentials ,” Vol. 14 Issue: 4 , pp.28 —33, Oct.-Nov. 1995.[27] F. G. Constantinos, I. M. Sotirios and S. V. Iakovos, “Towards the Introduction of the Asymmetric Cryptography in GSM, GPRS, and UMTS Networks,” Computers and Communications, 2001. Proceedings. Sixth IEEE Symposium, pp.15-21, 2001.[28] 張鴻泰, “UMTS認證協定之研究,” M.S.Thesis, Dept. of electrical engineering, Chung Yuan Christian University, 2000.[29] http://www.esat.kuleuven.ac.be/cosic/aspect/aspect.html [30] ETSI TS 121.133.”Security Threats and Requirements, http://www.etsi.org/[31] W. Diffie, M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, pp.644-654, 1976.[32] R. Moe, “Overview of the GSM system and protocol architecture,” IEEE Communication Magazine, pp. 92-100, April 1993.[33] B. Schneier, “Applied cryptography: Protocols , algorithms, and source code in C,” Wiley.[34] R. Bird et al., “Systematic Design of Two-Party Authentication Protocols,” Advances in Cryptology-CRYPTO’91, pp. 44-61, 1991.[35] G. Li, “Optimal authentication protocols resistant to password guessing attacks,” Proceedings of Eighth IEEE on Computer Security Foundations Workshop, pp.24-29, 1995.[36] G. Tsudik, E. Herreweghen, “Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacks,” Proceedings of The 12th Symposium on Reliable Distributed Systems, pp.136-141, 1993.[37] G. Lowe, “Some new attacks upon security protocols,” Proceedings of The 9th IEEE on Computer Security Foundations Workshop, pp.162-169,1996.[38] L. Gong, “Verifiable-text attacks in cryptographic protocols.” Ninth Annual Joint Conference of the IEEE Computer and Communication Societies, Vol.2, pp.686-693,1990.[39] P. Syverson, “A taxonomy of replay attacks,” Proceedings of Computer Security Foundations Workshop VII, pp.187-191, 1994.[40] S. Keung, K. Y. Siu, “Efficient protocols secure against guessing and replay attacks,” Proceedings of Fourth International Conference on Computer Communications and Networks, pp.105-112, 1995.[41] T. Kwon, J. Song, “ Security and efficiency in authentication protocols resistant to password guessing attacks,” Proceedings of The 22nd Annual Conference on Local Computer Networks, pp.245-252, 1997.[42] Y. Zheng, J. Seberry, “Immunizing public key cryptosystems against chosen ciphertext attacks,” IEEE Journal on Selected Areas in Communications, Vol.11, NO.5, pp.715-724, June 1993.
|