|
[1]W.-B. Lee and C.-K. Yeh, “A New Delegation-based Authentication Protocol for Use in Portable Communication Systems,” IEEE Transactions on Wireless Communications, Vol. 4, No.1, pp. 57-64, 2005. [2]K. Al-Tawill, A. Akrami, and H. Youssef, “A New Authentication Protocol for GSM Networks,” in Proc. 23rd Annu. IEEE Conf. Local Comput. Networks, 1999, pp. 21-30. [3]C.-H. Lee, M.-S. Hwang, and W.-P. Yang, “Enhanced Privacy and Authentication for the Global System for Mobile Communications,” Wireless Networks, Vol. 5, Issue 4, pp. 231-243, 1999 [4]M. J. Beller, L.-F. Chang, and Y. Yacobi, “Privacy and Authentication on a Portable Communication System,” IEEE Journal on Selected Areas in Communications, Vol. 11, Issue 6, pp. 821-829, 1993. [5]C.-C. Lo and Y.-J. Chen, “Secure Communication Mechanisms for GSM Networks,” IEEE Transactions on Consumer Electronics, Vol. 45, Issue 4, pp. 1074-1080, 1999. [6]T.-F. Lee, S.-H. Chang, T. Hwang and S.K. Chong, “Enhanced Delegation-Based Authentication Protocol for PCSs.” IEEE Transactions on Wireless Communications., Vol. 8, No. 5, pp. 2166-2171, 2009. [7]T.-Y. Youn and J. Lim, “Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability,” IEEE Communications Letters, Vol. 14, No. 9, pp. 791-793, 2011. [8]R.-C. Wang, W.-S. Juang, and C.L. Lei, “A Privacy and Delegation-Enhanced User Authentication Protocol for Portable Communication Systems,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 6, No. 3, pp. 183-190, 2011. [9]H.-B. Chen, Y.-H. Lai, K.-W Chen, and W.-B Lee, “Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization,” Journal of Electornic Science and Technology, Vol. 9, No. 4, pp.345-351, 2011. [10]S.-J. Hwang and Y.-H. Sung, “Confidential Deniable Authentication Using Promised Signcryption,” Journal of Systems and Software, Vol. 84, pp.1652-1659, 2011. [11]K. Nguyen, ”Asymmetric Concurrent Signatures,” in Proc. of Information and Communications Security Conference (ICICS 2005), LNCS 3783, New York: Springer-Verlag, 2005, pp. 181-193. [12]C. Schnorr, “Efficient Signature Generation by Smart Cards,“ Journal of Cryptology, No. 3, Vol. 4, pp.161-174, 1991. [13]D. Pointcheval and J. Stern, “Security Arguments for Digital Signatures and Blind Signatures,” Journal of Cryptography, No. 3, Vol.13, pp. 361-396, 2000.
|