|
[1] 3GPP TS 29.061. 3GPP: Technical specification group core network; interworking between the Public Land Mobile Network (PLMN) supporting packet based services and Packet Data Networks (PDN). Technical Report, Release 6, 3GPP, Mar. 2005. [2] 3GPP TS 33.102. 3GPP: Techinical specification group services and system aspects; 3g security; security architecture. Technical Report, Release 6, 3GPP, Dec. 2004. [3] 3GPP TS 33.105. 3GPP: Techinical specification group services and system aspects; 3G security; cryptographic algorithm requirements. Technical Report, Release 6, 3GPP, Jun. 2004. [4] 3GPP TS 33.200. 3GPP: Techinical specification group services and system aspects; 3g security; Network Domain Security (NDS); IP network layer security. Technical Report, Release 6, 3GPP, Jun. 2004. [5] 3GPP TS 33.200. 3GPP: Techinical specification group services and system aspects; 3G security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security. Technical Report. Release 6, 3GPP, Dec. 2004. [6] G. B. Agnew, B. C. Mullin, and S. A. Vanstone.Improved digital signature scheme based on discrete exponentiation. Electronics Letters, 26(14):1024-1025, 1990. [7] M. J. Beller, L.-F. Chang, and Y. Yacobi. Privacy and authentication on a portable communications system. In IEEE Globecom''91, pages 1922-1927, Phoenix, Dec. 1991. [8] M. J. Beller, L.-F. Chang, and Y. Yacobi. Privacy and authentication on a portable communications system. IEEE Journal on Selected Areas in Communications, 11(6):821-829, Aug. 1993. [9] D. Brown. Techniques for privacy and authentication in personal communication systems. IEEE Personal Communications, pages 6-10, Aug. 1995. [10] L. Buttyan, C. Gbaguidi, S. Staamann, and U. Wilhelm. Extensions to an authentication technique proposed for the global mobility network. IEEE Transactions on Communications, 48(3):373-376, March 2000. [11] Y.-S. Chang, T.-C. Wu, and S.-C. Huang. ElGamal-like digital signature and multisignature schemes using self-certified public keys. The Journal of Systems and Software, 50:99-105, Feb. 2000. [12] N. El-Fishway, M. Nofal, and A. Tadros. An effective approach for authentication of mobile users. Vehicular Technology Conference, 2002. VTC Spring 2002. IEEE 55th, 2:598-601, May 2002. [13] T. ElGamal. A public-key cryptosystem and a signature scheme basedon discrete logarithms. IEEE Transactions on Information Theory, IT-31(4):469-472, July 1985. [14] European Telecommunication Standards Institute (ETSI). Recommendation GSM 03.20: Security related network functions. Technical report, European Telecommunications Standards Institute, ETSI, June 1993. [15] J. Friis. TETRA, the industry standard from ETSI. In 2nd TETRA Middle East Conference, Intercontinental Hotel Dubai, May 2004. [16] L. Harn and W.-J. Hsin. On the security of wireless network access with enhancements. In Proceedings of the 2003 ACM workshop on Wireless security, pages 88-95, San Diego, CA, USA, Sep. 2003. [17] L. Harn and H.-Y. Lin. Modification to enhance the security of the GSM protocol. In Proceedings of the 5th National Conference on Information Security, pages 416-420, Taipei, May 1995. [18] W.-H. He. Digital signature scheme based on factoring and discrete logarithms. Electronics Letters, 37(4):220-222, 2001. [19] K.-F. Hwang and C.-C. Chang. A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Transactions on Wireless Communications, 2(2):400-407, March 2003. [20] M.-S. Hwang and C.-H. Lee. Authenticated key-exchange in a mobile radio network. European Transactions on Telecommunications, 8(3):265-269, 1997. [21] W.-S Juang, C.-L. Lei, and C.-Y. Chang. Anonymous channel and authentication in wireless communications. Computer Communications, 22(15-16):1502-1511, Sep. 1999. [22] B. Kaliski. TWIRL and RSA key size. Technical report, RSA Laboratories, May 2003. [23] G. M. Koien. An introduction to access security in umts. IEEE Transactions on Wireless Communications, 11(1):8-18, Feb. 2004. [24] H. Krawczyk, M. Bellare, and R. Canetti. Keyed-hashing for message authentication. Technical Report RFC 2104, IETF, Feb. 1997. [25] J. B. Lacy, D. P. Mitchell, and W. M. Schell. Cryptolib: Cryptography in software. In Proceedings of the UNIX Security Symposium IV, pages 1-17, 1993. [26] C.-C. Lee, M.-S. Hwang, and W.-P. Yang. Extension of authentication protocol for GSM. IEE Proc.-Commun., 150(2), April 2003. [27] C.-H. Lee, M.-S. Hwang, and W.-P. Yang. Enhanced privacy and authentication for the global system of mobile communications. Wireless Networks, 5:231-243, July 1999. [28] C.-H. Lee, M.-S. Hwang, and W.-P. Yang. A novel application of the phone card and its authentication in mobile communications. Journal of Information Science and Engineering, 15(4):471-484, 1999. [29] H. Lin and L. Harn. Authentication protocols for personal communication system. ACM SIGCOMM''95, pages 256-261, Aug. 1995. [30] H.-Y. Lin and L. Harn. Authentication protocols with nonrepudiation services in personal communication systems. IEEE Communications Letters, 3(8):236-238, Aug. 1999. [31] W.-D. Lin and J.-K. Jan. A wireless-based authentication and anonymous channels for large scale area. In Sixth IEEE Symposium on Computers and Communications, pages 36-41, Hammamet Tunisia, Jul. 2001. [32] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996. [33] R. C. Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology, CRYPTO''89, pages 218{238, Lecture Notes in Computer Science, Vol. 435, 1989. [34] R. C. Merkle. One-way hash functions and DES. In Advances in Cryptology, CRYPTO''89, pages 428-446, Lecture Notes in Computer Science, Vol. 435, 1989. [35] National Bureau of Standard. Data Encryption Standard. FIPS, NBS, 1977. [36] National Institute of Satndards and Technology (NIST). Digital signature standard (DSS). Technical Report FIPS PUB XX, NIST, US Department Commerce, Feb. 1993. [37] National Institute of Satndards and Technology (NIST). Advanced encryption standard. Technical Report FIPS 197, NIST, US Department Commerce, Nov. 2001. [38] National Institute of Satndards and Technology (NIST). Sepecial publication 800-57: Recommendation for key management. part 1: General guideline. Technical report, National Institute of Standards and Technology, Jan. 2003. [39] A. Peinado. Privacy and authentication protocol providing anonymous channels in GSM. Computer Communications, 27(17):1709-1715, Nov. 2004. [40] M. O. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical Report, MIT/LCS/TR212, MIT Lab., Computer Science Cambridge, MA, USA, January 1979. [41] R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120-126, Feb. 1978. [42] J. Scourias. Overview of the global system for mobile communications:GSM. http://www.privateline.com/PCS/GSM0.html. [43] A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-614, Nov 1979. [44] J. F. Stach, E. K. Park, and K. Makki. Performance of an enhanced GSM protocol supporting non-repudiation of service. Computer Communications, 22(7):675-680, May 1999. [45] S. Suzuki and K. Nakada. Authentication technique based on distributed security management for the global mobility network. IEEE Journal on Selected Areas in Communications, 15(8), Oct. 1997. [46] Telecommunication Standardization Sector of ITU. ITU-T Recommendation E.212: Identification plan for land mobile stations. Technical report, ITU-T, 1993. [47] International Telecommunication Union. Recommendation x.509-the directory authentication framework. Technical report, ITU-T, Nov. 1993. [48] J. E. Wilkes. Privacy and authentication needs of PCS. IEEE Personal Communications, 24:11-15, Aug. 1995.
|