1 |
JM. Zhu, and JF. Ma, "A new authentication scheme with anonymity for wireless environments," IEEE Transactions on Consumer Electronics, Vol.50, No.1, 2004, pp. 231-235.
DOI
|
2 |
M. Ramadan, GH. Du, FG. Li, and CX. Xu, "A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems," Symmetry-Basel, Vol.8, No.9, Article No. 85, 2016.
|
3 |
XH. Li and YJ. Wang, "Security enhanced authentication and key agreement protocol for LTE/SAE network," Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, IEEE.
|
4 |
R. Kreher and K. Gaenger, LTE SIGNALING Troubleshooting and Performance Measurement, John Wiley & Sons Ltd, United Kingdom, 2016, p.36.
|
5 |
P. Mahajan and A. Sachdeva, "A study of Encryption algorithms AES, DES and RSA for security," Global Journal of Computer Science and Technology, Vol.13, No.15, 2013.
|
6 |
B. Padmavathi and S. R. Kumari, "A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique," IJSR, Vol.2, No.4, 2013, pp.170-174.
|
7 |
P. K. Donta, "Performance Analysis of Security Protocols," UNF Theses and Dissertations, 2007.
|
8 |
E. Barker, Recommendation for Key Management- Part 1: General (Revision 4), NIST, U.S., 2016, pp.51-56.
|
9 |
Z. J. Haddad, Sanaa Taha and I. A. S. Ismail, "SEPS-AKA: A Secure EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCHEME FOR LTE-A NETWORKS," The Sixth International Conference on Wireless & Mobile Networks, 2014.
|
10 |
M. Ramadan, F. Li, C. X. Xu, A. Abdalla and H. Abdalla, "An Efficient End-to-End Mutual Authentication Scheme for 2G-GSM System," Big Data Analysis(ICBDA), IEEE International Conference, 2016.
|
11 |
김태경, "위치 기반 관광 정보 서비스 보안 기술연구," 디지털산업정보학회 논문지, 제12권, 제2호, 2016, pp. 25-29.
|
12 |
H. C. Poehls, "Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Buletooth," M.Sc. in Information Security-Information Security Group, Royal Holloway, University of London, 2001.
|
13 |
장범환, "트래픽 세션의 포트 역할을 이용한 네트워크 공격 시각화," 디지털산업정보학회 논문지, 제11권, 제4호, 2015, pp. 47-60.
|