1 |
Rao J, Rohatgi P, Scherzer H, and Tinguely S., "Partitioning attacks: or how to rapidly clone some GSM cards," IEEE symposium on security and privacy, 2002.
|
2 |
Khan M, Ahmed A and Cheema A.R, "Vulnerabilitis of UMTS Access Domain Security Architecture", Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD '08, Ninth ACIS International Conference on
|
3 |
Eastlake D, Crocker S, Schiller J., "Randomness recommendations for security," IETF RFC 1750, 1994.
|
4 |
Fry M, Fischer M, Karaliopoulos M, smith P and Hutchison D, "Challenge identification for network resilience", Next Generation Internet(NGI), 2010 6th EURO-NF Conference on, pp.1-8, 2010
|
5 |
Liberty Alliance. Liberty ID-FF bindings and profiles specification v1.2, 2003.
|
6 |
Microsoft Corp. Microsoft.NET passport review guide, .
|
7 |
Pfitzmann B and Waidner M, "Analysis of liberty single-sign-on with enabled clients," Internet Computing, IEEE, Vol.7, Issue:6, pp.38-44, 2003.
DOI
ScienceOn
|
8 |
Liberty Alliance. Liberty trust models guidelines v1.0, 2003.
|
9 |
IDC, Worldwide Identity Theft Black Market 2006-2010 Forecast, 2006.
|
10 |
Liberty Alliance Project, http://www.projectliberty.org/
|
11 |
Microsoft, Introducing Windows CardSpace, http://msdn.microsoft.com/
|
12 |
OpenID, http://openid.net/
|
13 |
Security Assertion Markup Language(SAML) OASIS Standard Specification, Version 2.0, http://www.oasis-open. org/committees/tc_home.php?wg_abbrev=security
|
14 |
Higgins Project, http://www.eclipse.org/higgins/
|
15 |
Siemens, "Identity management for micropayments in a mobile environment," Paycircle, 2003.
|
16 |
Christos K. Dimitriadis and Despina Polemi, "An identity management protocol for Internet applications over 3G mobile networks," Computers & Security, Vol.25, pp.45-51, February, 2006.
DOI
ScienceOn
|
17 |
3rd Generation Partnership Project. TS 33.102 - 3G security; security architecture v6.0.0, 2003.
|
18 |
Ed Gerck, Secure Email Technologies X.509 / PKI, PGP, IBE, and ZMAIL, in Chapter 12, Corporate Email Management, ICFAI University Press, pp.171-196, 2007.
|
19 |
http://www.gnupg.org
|
20 |
http://www.3gpp.org
|
21 |
3rd Generation Partnership Project. TS 33.234 - 3G security; wireless local area network (WLAN) interworking security v6.0.0, 2004.
|
22 |
OASIS. Glossary for the OASIS security assertion markup language(SAML) v1.1, 2003.
|
23 |
Liberty Alliance. Liberty ID-FF protocols and schema specification v1.2, 2003.
|
24 |
Liberty Alliance. Liberty ID-FF architecture overview v1.2, 2003.
|
25 |
http://www.sdl-forum.org/MSC/index.htm
|
26 |
Dimitriadis C and Polemi D., "A protocol for incorporating biometricsin 3G with respect to privacy," 7th international conference on enterprise information systems (ICEIS2005), pp.123-135, 2005.
|
27 |
3rd Generation Partnership Project. TS 31.101 - UICC terminal interface; physical and logical characteristics v6.2.0, 2003.
|
28 |
3rd Generation Partnership Project 2. S.R0082 enhanced packet data air interface security v1.0, 2003.
|
29 |
Urien P, Pujolle G, EAP-support in smartcard draft-urien-eap-smartcard-21.txt, IETF draft, 2011.
|
30 |
Wisely D, Eardley P, and Burness L. IP for 3G - networking technologies for mobile communications, John Wiley & Sons, 2002.
|
31 |
3rd Generation Partnership Project. TS 23.234 - 3GPP system to wireless local area network (WLAN) interworking; system description v2.4.0, 2004.
|
32 |
Mont M, Pearson S, and Bramhall P., "Towards accountable management of identity and privacy," Proceedings of 14th international workshop on database and expert systems applications, 2003.
|
33 |
Bonatii P and Samarati P., "A unified framework for regulating service access and information release on the web," Computer Security Journal, Vol.10(3), pp.241-72, 2003.
|
34 |
Damiani E, De Capitani di Vimercati S, and Samarati P., "Managing multiple and dependable identities," IEEE Internet Computing, Vol.7(6), pp.29-37, 2003.
DOI
ScienceOn
|