1 |
M.J. Beller, L.F. Chang, and Y. Yacobi, "Privacy and authentication on a portable communications system," IEEE J. Sel. Areas Commun., vol. 11, pp. 821-829, Aug. 1993.
DOI
ScienceOn
|
2 |
H.-Y. Lin and L. Harn, "Authentication protocols with non-repudiation services in personnel communication systems," IEEE Commun. Lett., vol. 3, no. 8, pp. 236-238, Aug 1999.
DOI
ScienceOn
|
3 |
H.-Y. Lin, "Security and authentication in PCS,' Comput. Elect. Eng., vol. 25, no. 4, pp. 225-248, Jul. 1999.
DOI
ScienceOn
|
4 |
W.-B. Lee and C.-K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Trans. Wireless Commun, vol. 4, no. 1, pp. 57-64, Jan. 2005.
DOI
|
5 |
M. Rahnema, "Overview of the GSM system and protocol architecture," IEEE Commun. Mag., pp. 92-100, Apr. 1993.
|
6 |
M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun., vol. 4, pp. 734-742, Mar. 2005.
DOI
|
7 |
C.C. Lo and Y.J. Chen, "Secure communication mechanisms for GSM networks," IEEE Trans. Consum. Electron., vol. 45, pp. 1074-1080, Nov. 1999.
DOI
ScienceOn
|
8 |
T.-F. Lee, C.-C. Chang, and T. Hwang, "Private authentication techniques for the global mobility network," Wireless Personal Commun., vol. 35, no. 4, pp. 329-336, Dec. 2005.
DOI
ScienceOn
|
9 |
T.-F. Lee, S.-H. Chang, T. Hwang, and S.-K. Chong, "Enhanced Delegation- Based Authentication Protocol for PCSs," IEEE Transactions on Wireless Communications, vol. 8, no. 5, pp. 2166-2171, May 2009.
DOI
|