1 |
Lee. C.C., Hwang. M.S,, Yang. W.P., 'Extension of Authentication Protocol for GSM,' IEE Proceedings. Communications, 150(2), pp. 91-95, 2003
|
2 |
L. Chichun, C. Yujen, 'Stream Ciphers of GSM,' Computer Communications 24, pp. 1090-1096, 2001
DOI
ScienceOn
|
3 |
O. Aydemir, A. A. Selcuk, 'A Strong User Authentication Protocol for GSM,' 14th IEEE Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises( WETICE'05), Linkoping, Sweden, June 2005
|
4 |
C. Yeongsub, C. Sangrae, C. Daeseon, J. Seunghun, C. Kyoil, P. Cheehang, 'A Location Privacy Protection Mechanism for Smart Space,' WISA2003, LNCS 2908, pp. 162-173, 2004
|
5 |
W.B. Lee, C.K. Yeh, 'A New Delegation- Based Authentication Protocol for User in Portable Communication Systems,' IEEE Transactions on wireless communications, Vol.4, No.1, pp. 57-64, 2005
DOI
ScienceOn
|
6 |
C. Youngjae, K. Soonja, 'An Improvement on Privacy and Authentication in GSM,' WISA2003, LNCS 3325, pp. 14-26, 2004
|
7 |
L. Chichun, C. Yujen, 'Secure Communication Mechanism for GSM Networks,' IEEE Transactions on Consumer Electronics, 45(4), pp. 1074-1080, November 1999
DOI
ScienceOn
|