1. A. Aziz and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks,” IEEE Personal Communications, vol. 1, pp. 25–31, 1994.
2. A.M. Basyouni and S.E. Tavares, “Public Key versus Private Key in Wireless Authentication Protocols,” Proceedings of the Canadian Workshop on Information Theory, pp. 41–44, Toronto, June 1997.
3. M. J. Beller, L.-F. Chang, and Y. Yacobi, “Privacy and Authentication on a Portable Communications System,” in Proceedings of GL0BECOM'91, pp. 1922–1927, IEEE Press, 1991.
4. M. J. Beller, L.-F. Chang, and Y. Yacobi, “Security for Personal Communication Services: Public-Key vs. Private Key Approaches,” in Proceedings of Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'92), pp. 26–31, IEEE Press, 1992.
5. M. J. Beller, L.-F. Chang, and Y. Yacobi, “Privacy and Authentication on a Portable Communications System,” IEEE Journal on Selected Areas in Communications, vol. 11, pp. 821–829, Aug. 1993.