Author:
Kwak Jin,Oh Soohyun,Won Dongho
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Beller, M.J., Chang, L.F., Yacobi, Y.: Security for Personal Communication Service: Publickey vs. Private key approaches. In: Proceedings of Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications–PIMRC 1992, pp. 26–31 (1992)
2. Beller, M.J., Chang, L.F., Yacobi, Y.: Privacy and authentication on a portable communications system. IEEE Journal on Selected Areas in Communications 11(6), 821–829 (1993)
3. Beller, M.J., Yacobi, Y.: Fully-fledged two-way public key authentication and key agreement for low-cost terminals. IEE Electronics Letters 29(11), 999–1001 (1993)
4. Carlsen, U.: Optimal Privacy and Authentication on a Portable Communications System. ACM Operating Systems Review 28(3), 16–23 (1994)
5. Go, J.S., Kim, K.J.: Wireless authentication Protocols Preserving User Anonymity. In: Proceedings of SCIS 2001, vol. 2(1), pp. 159–164 (2001)