|
[1]3GPP TS 33.102 V5.1.0 Dec. 2002. [2]S.G. AKL, P.D. Taylor, "Cryptography solution to a problem of access control in a hierarchy" ACM Transaction on Computer Systems, Vol. 1, No. 3, pp. 239-248 Aug. 1983. [3]K. Al-Tawil, A. Akrami and H. Youssef, "A new authentication protocol for GSM networks" 23rd Annual Conference on Local Computer Networks, 1998. LCN ''98. Proceedings, pp. 21-30, Oct. 1998. [4]K. Al-Tawil, A. Akrami, "A new authentication protocol for roaming users in GSM networks" IEEE International Symposium on Computers and Communications, 1999. Proceedings, pp. 93 -99, 1999. [5]R. Anderson, Invited lecture, Fourth Annual Conference on Computer and Communications Security, ACM, 1997. [6]A. Aziz, W. Diffie, "Privacy and authentication for wireless local area networks" IEEE Personal Communications, Vol. 1, Issue: 1, pp. 25-31, 1st Qtr 1994 [7]M. Bellare, S. Miner, "A forward secure digital signature scheme" CRYPTO''99 LNCS Vol. 1666, pp. 431-448, Aug. 1999. [8]M.J. Beller, L.F. Chang and Y. Yacobi, "Privacy and authentication on a portable communications system" Global Telecommunications Conference, 1991. GLOBECOM ''91, Vol. 3, pp. 1922-1927, Dec. 1991. [9]V. Bharghavan, C.V. Ramamoorthy, "Security issues in mobile communications" Second International Symposium on Autonomous Decentralized Systems, 1995. Proceedings, ISADS 95, pp. 19-24, Apr. 1995. [10]T.G. Brutch, P.C. Brutch, "Mutual Authentication, Confidentiality, and Key MANagement (MACKMAN) system for mobile computing and wireless communication" Computer Security Applications Conference, 1998, Proceedings, pp. 308-317, 14th Annual, Dec. 1998. [11]W. Deng, M. Chen and B. Ai, "Enhancing authentication mechanism with mobile agent in mobile communication system" Vehicular Technology Conference, 2000. IEEE VTS-Fall VTC 2000. 52nd, Vol. 4, pp. 1956-1959, 2000. [12]W. Diffie, M.E. Hellman, "New Direction in Cryptography" IEEE Transaction on Information Theory, Vol. IT-22, No. 6, pp. 644-654, Nov. 1976. [13]N. El-Fishway, M. Nofal and A. Tadros, "An effective approach for authentication of mobile users" Vehicular Technology Conference, 2002. VTC Spring 2002. IEEE 55th, Vol. 2 pp. 598-601, 2002. [14]L.C. Guillou, J.J. Quisquater, "A paradoxical identity-based signature scheme resulting from zero-knowledge" Advances in Cryptology CRYPTO''88 LNCS Vol. 403, pp. 216-231, Aug. 1988. [15]C. Gunther, "An identity based key exchange protocol" Eurocrypt 89 Proceedings, LNCS Vol. 434, 1989. [16]L. Harn, H.Y. Lin, "Modification to enhance the security of the GSM protocol" Proc. of the 5th National Conference on Information Security, ROC. pp. 74-76, May. 1995. [17]G. Horn, K.M. Martin and C.J. Mitchell, "Authentication protocols for mobile network environment value-added services" IEEE Transactions on Vehicular Technology, Vol. 51 Issue: 2, pp. 383-392, Mar. 2002. [18]G. Itkis, L. Reyzin, "Forward-secure signatures with optimal signing and verifying" CRYPTO 2001, LNCS Vol. 2139, August. 2001. [19]ITU-T Recommendation X.509, "Information Technology Open System Interconnection - The Directory: Authentication Framework" Jan. 1997. [20]N. Jefferies, "Security in third-generation mobile systems" IEE Colloquium on Security in Networks, pp. 8/1 -8/5, Feb. 1995. [21]C.H. Lee, M.S. Hwang and W.P. Yang, "Enhanced privacy and authentication for the global system for mobile communications" Wireless Network, pp. 231-243, 1999. [22]J. Liu, Y. Wang, "A user authentication protocol for digital mobile communication network" Personal, Sixth IEEE International Symposium on Indoor and Mobile Radio Communications, 1995. PIMRC''95. Wireless: Merging onto the Information Superhighway, Vol. 2, pp. 608-612, Sep. 1995. [23]J. Liu, Y. Wang, "Authentication of mobile users in personal communication system" Seventh IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 1996. PIMRC''96, Vol. 3, pp. 1239-1242, Oct. 1996. [24]C.C. Lo, Y.J. Chen, "Secure communication mechanisms for GSM networks" IEEE Transactions on Consumer Electronics, Vol. 45, Issue: 4, pp. 1074-1080, Nov. 1999. [25]B. Mallinder, "An overview of the GSM system" Proc. Digital Cellular Radio Conf, Oct. 1988. [26]A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, "Handbook of applied cryptography" CRC, 1997. [27]R. Molva, D. Samfat and G. Tsudik, "Authentication of mobile users" IEEE Network , Vol. 8, Issue: 2, pp. 26-34, Mar/Apr. 1994. [28]R. Pandya, D. Grillo, E. Lycksell, P. Mieybegue, H. Okinaka and M. Yabusaki, "IMT-2000 Standards: Network Aspect" IEEE Personal Communications, pp. 20-29, 1997. [29]C.S. Park, "On certificate-based security protocols for wireless mobile communication systems" IEEE Network, Vol. 11, Issue: 5, pp. 50-55, Sep/Oct. 1997. [30]S. Putz, R. Schmitz and F. Tonsing, "Authentication schemes for third generation mobile radio systems" The Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Vol. 1, pp. 126 -130, Sep. 1998. [31]M. Rahnema, "Overview of the GSM system and protocol architectures" IEEE Communication Magazine, Apr. 1993. [32]R. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signature and public key cryptosystems" Communication of the ACM, Vol. 21, No.2, pp. 120-126, Feb. 1978. [33]M.I. Samarakoon, B. Honary, "Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems" IEE Colloquium on Novel DSP Algorithms and Architectures for Radio Systems (1999/184), pp. 9/1 -9/5, 1999. [34]Z.J. Tzeng, W.G. Tzeng, "Authentication protocols for the third generation mobile systems," Personal Wireless Communications 16, pp. 35-50, 2001. [35]J.E. Wilkes, "Privacy and authentication needs of PCS" IEEE Personal Communications Vol. 2, Issue: 4, pp. 11-15, Aug. 1995. [36]Y. Yacobi, Z. Shmuely, "On key distributions" CRYPTO''89, Aug. 1989. [37]賴溪松、韓亮、張真誠,"近代密碼學及其應用" 旗標出版股份有限公司,2003
|