1 |
Lam, K.Y., Chung, S.L., Gu,M. and Sun, J.G. : Lightweight security for mobile commerce transactions. Computer Communications, Elsevier, 26, 2052--2060 (2003)
DOI
ScienceOn
|
2 |
Frier, A., Karlton, P. and Kocher,P. : The SSL 3.0 Protocol. Netscape Communications Corp., (1996)
|
3 |
Aydos, M., Yanik, T. and Koc, C.K. : High- speed implementation of an ECC-cased wireless authentication protocol on an ARM microprocessor, IEEE Proceedings- Communi- cations, Vol. 148, No. 5, pp.273 279 (2001)
|
4 |
Admas, C., Farrell, S., Kause, T. and Mononen, T. : Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP) : IETF RFC 2510, IETF Network working Group (2005)
|
5 |
Chadwick, D. W., Mundy D. and New, J. : Experiences of using a PKI to access a hospital information system by high street opticians, Computer Communications, Elsevier, 26, 1893-1903 (2003)
DOI
ScienceOn
|
6 |
Morogan, M.C. and Muftic, S. : Certificate Management in Ad hoc Networks, IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando (2003)
|
7 |
WMLScript Crypto Library, WAP-161-WML ScriptCrypto, OMA (2001)
|
8 |
Wireless Application Protocol - WirelessPublic Key Infrastructure, WAP-217-WPKI, OMA (2001)
|
9 |
Lenstra, A.K. and Verheul, E.R. : Selecting Cryptographic Key Sizes, PKC 2000, Journal of Cryptology, 14, 255--293 (2001)
DOI
|
10 |
WAP Certificate and CRL, WAP-211-X.509, OMA (2000)
|
11 |
PKCS#10 : Certification Request Syntax Standard, RSA Laboratories (2000)
|
12 |
Selected Attrubute Type Standard, RSA Laboratories PKCS#9 v1.2, (1993)
|
13 |
Lee, J.L., Lee, Y. and Song, J.S. : Wireless PKI Technology in Korea. In : The First International Workshop for Asian PKI, pp 145--158 (2001)
|
14 |
Wireless Application Protocol WAP2.0 Technical White Paper, OMA (2001)
|
15 |
Wireless Application Protocol Architecture Specification, WAP-210-WAPArch, OMA (2001)
|
16 |
Wireless Transport Layer Security, WAP-261- WTLS, OMA (2001)
|
17 |
ITU-T Recommendation X.509(1997) | ISO/IEC 9594-8:1998, Information technology - Open Systems Interconnection - The Directory: Authentication Frame work
|
18 |
Schneier, B.:Applied Cryptocgraphy, 2nd, Wiley, New York (1996)
|
19 |
Myers, M., Adams, C., Solo, D. and Kemp, D. : Internet X.509 Certificate Request Message Format:IETF RFC2511, IETF Network Working Group (1999)
|
20 |
Extended-Certificate Syntax Standard, RSA Laboratories PKCS#6 v2.0 (1999)
|
21 |
WAPTransportLayer E2E Security Specification, WAP Forum Approved Version 11-July-2000, OMA (2000)
|
22 |
Dierks, T. and Allen, C. : The TLS Protocol Version 1.0 : IETF RFC2246, IETF Network Working Group (1999)
|
23 |
Digital Signature Standard (DSS) : FIPS 186-2, NIST (2000)
|
24 |
Polk, W., Housley, R. and Bassham, L. : Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile : IETF RFC3279," IETF Network Working Group (2002)
|
25 |
Myers, M., Ankney, R., Malpani, A., Galperin, S. and Adams, C. : X.509 Internet Public Key Infrastructure Online Certificate Status Protocol OCSP : IETF RFC2560, IETF Network Working Group (1999)
|
26 |
Housley, R., Polk, W., Ford, W. and Solo, D. : Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile : IETF RFC3280, IETF Network Working Group (2002)
|