References
- N. Asokan, 'Anonymity in a Mobile Computing Environment,' Proceedings of Workshop in Mobile Computing Systems and Applications, December 1994 https://doi.org/10.1109/MCSA.1994.513484
- J. Elliott, 'Hide yourself in Cyberspace,' Internet, May 1995
- G. H. Forman, J. Zahorjan, 'The Challenges of Mobile Computing,' IEEE Computer, April 1994 https://doi.org/10.1109/2.274999
- Paul Newson, Mark R. Heath, 'The Capacity of a Spread Spectrum CDMA System for Cellular Mobile Radio with Consideration of System Imperfections,' IEEE journal of selected areas in communications, vol. 12, No. 4, May. 1994 https://doi.org/10.1109/49.286674
- M. Bellare, S. Goldwasser, 'New Paradigms for digital Signatures and Message Authentication Based on Non-Interactive Zero Knowledge Proofs,' Proceedings of Crypto 89, 1989
- D. Chaum, 'Security Without Identification: Security Systems to Make Big Brother Obsolete,' Comm. of the ACM. October 1985 https://doi.org/10.1145/4372.4373
- C. Harrison, D. M. Chess, A. Kershenbaum, 'Mobile Agents: Are they a good idea?' IBM Research Report, March 28, 1995
- J. Ioannidis, 'Protocols for Mobile Internetworking,' PhD Thesis, University of Columbia, ftp://ftp.cs.columbia.edu/pub/ji/thesis.ps.gz
- Byoung-Hoon Kim and Byeong Gi Lee, 'PDSA: Parallel Distributed Sample Acquisition for Mary DS/CDMA Systems,' IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, No. 4, pp. 589-593, APRIL 2001 https://doi.org/10.1109/26.917763
- D. Chaum, 'The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability,' Journal of Cryptology (1988) 1
- D. Samfat, R. Molva, 'A Method Providing Identity Privacy to Mobile Users during Authentication' https://doi.org/10.1109/MCSA.1994.513483
- F. Stoll, 'The Need for Decentralization and Privacy in Mobile Communications Networks,' In Network Security Observations, January 1995 https://doi.org/10.1016/0167-4048(95)00014-Y
- J. Dunlop, D. G. Smith, 'Telecommunications Engineering, 3rd Ed,' Chapman & Hall, 1994
- Sung-Shik Woo, Heung-Ryeol You, Tae-Gun Kim, 'The Position Location System Using IS-95 CDMA Networks,' IEEE, 2000 https://doi.org/10.1109/EURCOM.2000.874763
- Weiping Xu, Laurence B. Milstein, 'On the Use of Interference Suppression to Reduce Intermodulation Distortion in Multicarrier CDMA Systems,' IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001 https://doi.org/10.1109/26.898257
- A. Herzberg, H. Krawczyk, G. Tsudik, 'On Travelling Incognito,' Proceedings of the 1994 Workshop on Mobile Computing, 1994 https://doi.org/10.1109/MCSA.1994.513485
- Francisco Javier Gonzalez-Serrano, Juan Jose Murillo-Fuentes, 'Adaptive Nonlinear Compensation for CDMA Communication Systems,' IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 50, NO. 1, pp. 34-42, JANUARY 2001 https://doi.org/10.1109/25.917867
- A. K. Elhakeem, Haiying Zhu, Saud A. Al-Semari, 'Virtual Matched Filtering: A new Hybrid CDMA code acqusition Technique under Doppler and higher CDMA loads,' IEEE, 2000 https://doi.org/10.1109/EURCOM.2000.874775
- T. A. Freeburg, 'Enabling Technologies for Wireless In-Building Network Communications - Four Technical Challenges, Four Solutions,' IEEE Communications Magazine. April 1991 https://doi.org/10.1109/35.76559
- D. B. Johnson, 'Routing in Ad-Hoc Networks of Mobile Hosts,' Computer Science Department, Carnegie Mellon University
- Youngkook Kim, Saewoong Bahk, 'Multiaccess scheme to ensure security in CDMA-based wireless LANs,' Electronics Letters 27th May 1999, Vol. 35, No. 11 https://doi.org/10.1049/el:19990650
- B. Marsh, F. Douglis, R. Caceres, 'Systems Issues in Mobile Computing,' MITL Technical Report MITL-TR-50-93. February 1993
- A. Mukherjee, D. P. Siewiorek, 'Mobility: A Medium for computation, Communication, and Control,' School of Computer Science, Carnegie Mellon University https://doi.org/10.1109/MCSA.1994.512727
- R. Needham. 'Denial of Service: An Example,' Communications of the ACM, November 1994 https://doi.org/10.1145/188280.188294
- C. Park, K. Kurosawa, T. Okamoto, S. Tsujii. 'On Key Distribution and Authentication in Mobile Radio Networks,' Proceedings of EUROCRYPT '93, Springer-Verlag
- J. Scourias. 'Overview of the Global System for Mobile Communications,' University of Waterloo
- M. Spreitzer, M. Theimer. 'Scalable, Secure, Mobile Computing with Location Information,' Communications of the ACM, July 1993 https://doi.org/10.1145/159544.159558
- L. Tancevski, I. Andonovic, M. Tur, J. Budin, 'Massive Optical Lan's Using Wavelength Hopping/Time Spreading with Increased Security,' IEEE Photonics Technology Letters, Vol. 8, No. 7, July 1996 https://doi.org/10.1109/68.502276
- M. Tatebayashi, N. Matsuzaki. 'Key Distribution Protocol for Digital mobile Communication Systems,' Proceedings of CRYPTO'89, Springer-Verlag
- J. E. White. 'Telescript Technology: The Foundation for the Electronic Marketplace,' General Magic, Inc., Mountain View, CA. 1994
- M. Wooldridge, R. Jennings. 'Intelligent Agents: Theory and Practice,' Knowledge Engineering Review. October 1994 https://doi.org/10.1017/S0269888900008122