1 |
Y. Mu, V. Varadhrarajan, 'On the Design of Security Protocols for Mobile Commmications', ACISP'96 Conference, Pringer-Verlang, pp. 134 -146, 1996
|
2 |
'3rd Generation Partnership Project: General Report on the Design, Specification and Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms', 3GPP Technical Spec., 2000
|
3 |
C. Boyd, D. G. Park, 'Public Key Protocols for WIreless Comrmmications', Proceedings of ICISC; 98, pp. 47 -57, 1998
|
4 |
A. Aziz, W. Diffie, 'Privacy and Authentication for WIreless Local Area Network', IEEE Personal Commnunications, Vol. 1, pp. 25-31, 1994
DOI
ScienceOn
|
5 |
R. Joos, A. Tripathi, 'Mutual Authentication in Wireless Network', Technical Report, Department of Computer Science, University of Minnesota, June 4, 1997
|
6 |
M. Torabi, Rolfe E.Buhrke, 'Third Generation Mobile Telecommunications and Virtual Home Environment', Bell Lab Tech. Journal, 1998
DOI
ScienceOn
|
7 |
M. Torabi, 'A Shift in the Mobile Network Service Provisioning Paradigm', Bell Lab Tech. Journal, 2000
DOI
ScienceOn
|
8 |
J. Hartmann, C. Gorg, P. Farjami, 'Agent Technology for the UMTS VHE Concept', ACM/IEEE MobiCom'98, Workshop on Wireless Mobile Multimedia, Dallas, United States, October 1998
DOI
|
9 |
'3rd Generation Partnership Project: The Vutual Horre Environment (3G TS22.121 Ver 3.1.0)', 3GPP Technical Spec., 1999
|
10 |
'Network functional model for IMT2000', ITU-T Recommendation Q.l711, Mach 1999
|