共 50 条
- [31] MacSim - A framework for MAC and LAC Protocols analysis on 3G mobile communication systems [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2002, : 486 - 492
- [32] Security analysis of two anonymous authentication protocols for distributed wireless networks [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 284 - 288
- [33] Security analysis of two ultra-lightweight RFID authentication protocols [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 109 - +
- [34] Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 235 - 253
- [35] Limitations of Authentication Test in the Analysis of Multi-party Security Protocols [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2243 - 2247
- [36] Secure 3G user authentication in adhoc serving networks [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 488 - +
- [37] Imroved authentication for IMS registration in 3G/WLAN interworking [J]. 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 2794 - +
- [38] Research on the Authentication Mechanism for 3G Mobile Communication System [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4671 - 4673
- [39] Biometric-enabled authentication in 3G/WLAN systems [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 164 - 167
- [40] An efficient authentication protocol with anonymity for 3G/WLAN interworking [J]. JOURNAL OF INTERNET TECHNOLOGY, 2008, 9 (01): : 15 - 24