Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference37 articles.
1. Refaey A, Hammad K, Magierowski S, Hossain E (2020) A blockchain policy and charging control framework for roaming in cellular networks. IEEE Netw 34(3):170–177
2. Nayak S, Singh A, Vora J, Marchi L, Thomas M, Alexander M, Prasad S, Mangla U (2020) Blockchain for telecom roaming, fraud user identification, and overage management. https://developer.ibm.com/technologies/blockchain/patterns/blockchain-for-telecom-roaming-fraud-and-overage-management/ Accessed 28 Apr, 2020
3. Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 232(50):231–235
4. Wu C, Lee W, Tsaur W (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723
5. Zeng P, Cao Z, Choo K, Wang S (2009) On the anonymity of some authentication schemes for wireless communication. IEEE Commun Lett 13(3):170–171
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献