Author:
Jiang Qi,Ma Jianfeng,Li Guangsong,Yang Li
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference33 articles.
1. Samfat, D., Molva, R., & Asokan, N. (1995). Untraceability in mobile networks. In ACM Mobicom’95 (pp. 26–36).
2. Boyd, C., & Mathuria, A. (2000). Key establishment protocols for secure mobile communications: A critical survey. Computer Communications, 23(5–6), 575–587.
3. Jiang, Y. X., Lin, C., & Shen, X. M. (2006). Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications, 5(9), 2569–2577.
4. Yang, G. M., Wong, D. S., & Deng, X. T. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 1035–1042.
5. Debiao, H., Jianhua, C., & Jin, H. (2012). An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion, 13(3), 223–230.
Cited by
64 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献