參考文獻 |
[1]K. Al-Tawil, A. Akrami, H. Youssef, “A new authentication protocol for GSM networks, ” Local Computer Networks, 1998. LCN '98. Proceedings., 23rd Annual Conference on , 1998 , Page(s): 21 -30
[2]B. Askwith, M. Merabti, Q. Shi, K. Whiteley, “Achieving user privacy in mobile networks,” Computer Security Applications Conference, 1997. Proceedings., 13th Annual , 1997 , Page(s): 108 -116
[3]C. Brookson, “GSM security: a description of the reasons for security and the techniques,” Security and Cryptography Applications to Radio Systems ,IEE Colloquium on , 1994 , Page(s): 2/1 -2/4
[4]D. Brown, “Techniques for privacy and authentication in personal communication systems, ” IEEE Personal Communications Volume: 2 4 , Aug. 1995 , Page(s): 6 -10
[5]D. G. W. Birch, I. J. Shaw, “Mobile communications security-private or public, ” Security and Cryptography Applications to Radio Systems, IEE Colloquium on , 1994 , Page(s): 5/1 -5/6
[6]C. Carroll, Y. Frankel, Y. Tsiounis, “Efficient key distribution for slow computing devices: achieving fast over the air activation for wireless systems,” Security and Privacy, 1998. Proceedings. 1998 IEEE Symposium on , 1998 , Page(s): 66 -76
[7]C. H. Chang, K. Tu, K. C Chen, “Efficient end-to-end authentication protocols for mobile networks,” Personal, Indoor and Mobile Radio Communications, 1996. PIMRC'96., Seventh IEEE International Symposium on Volume: 3 , 1996 , Page(s): 1252 -1256 vol.3
[8]L. P. Chin, “A secure registration protocol for wireless Internet, ” Personal, Indoor and Mobile Radio Communications, 1997. Waves of the Year 2000. PIMRC '97., The 8th IEEE International Symposium on Volume: 2 , 1997 , Page(s): 495 -499 vol.2
[9]D. E. Denning, M. Smid, “Key escrowing today,“ IEEE Communications Magazine Volume: 32 9, Sept. 1994, Page(s): 58 -68D. Brown, “Techniques for privacy and authentication in personal communication systems, ” IEEE Personal Communications Volume: 2 4 , Aug. 1995 , Page(s): 6 -10
[10]H. L. Galiano, L. L. Ling, “An analysis of signaling traffic for authentication and privacy protocols in cellular and PCS systems, ” Telecommunications Symposium, 1998. ITS '98 Proceedings. SBT/IEEE International , 1998 , Page(s): 329 -334 vol.1
[11]S. R. Hall and D. P. Maher, “Closing in on wireless privacy,” AT&T Technol., vol. 8, pp. 22-25, 1993
[12]N. Jefferies, “Security in third-generation mobile systems, ” Security in Networks (Digest No. 1995/024), IEE Colloquium on 1995 , Page(s): 8/1 -8/5
[13]J. Kim, M. Oh, T. Kim, “Security requirements of next generation wireless communications,” Communication Technology Proceedings, 1998. ICCT '98. 1998 International Conference on , 1998 , Page(s): 6 pp. vol.1
[14]C. C Lo, Y. J. Chen ,“Secure communication mechanisms for GSM networks, ” Consumer Electronics, IEEE Transactions on Volume: 45 4 , Nov. 1999 , Page(s): 1074 -1080 N. Jefferies, “Security in third-generation mobile systems, ” Security in Networks (Digest No. 1995/024), IEE Colloquium on 1995 , Page(s): 8/1 -8/5
[15]L. Makris, N. Argiriou, M. G. Strintzis, “Network access and data security design for telemedicine applications,” Computers and Communications, 1997. Proceedings., Second IEEE Symposium on , 1997 , Page(s): 523 -527
[16]S. Mohan, “Two User Location Strategies for Personal Communications Services,” IEEE Personal Communications, p.42-50. First Quarter 1994.
[17]S. Mohan, “Privacy and authentication protocols for PCS, ” IEEE Personal Communications Volume: 3 5 , Oct. 1996 , Page(s): 34 —38
[18]C. P. Pfleeger, “Security In Computing,” 1st ed: Pentice Hall International, 1989.
[19]G. Pollini, D. Goldman, “Signaling System Performance — Evaluation for PCS,” IEEE Transactions On Vehicular Technology, p. 131-138, Feb. 1996.
[20]R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” communications of the ACM, vol. 21, no.2, pp.120-126, 1978
[21]K. T. Salli, T. Hamalainen, J. Knuutila, J. Saarinen, “Security design for a new wireless local area network TUTWLAN, ” Personal, Indoor and Mobile Radio Communications, 1998. The Ninth IEEE International Symposium on Volume: 3 , 1998 , Page(s): 1540 -1544 vol.3
[22]V. Varadharajan, Y. Mu ,“Preserving privacy in mobile communications: a hybrid method,” Personal wireless Communications, 1997 IEEE International Conference on , 1997 , Page(s): 532 —536
[23]D. Weissman, D. W. Dudich, M. S. Grob, “End-to-end security for commercial PCS networks,” Military Communications Conference, 1995. MILCOM '95, Conference Record, IEEE Volume: 3 , 1995 , Page(s): 1253 -1257 vol.3
[24]M. Walker, R. Forbes, D. Gollman, “Security aspects of third generation mobile telecommunications systems, ” Mobility in support of Personal Communications, IEE Colloquium on , 1993 , Page(s): 5/1 -5/4
[25]“The SSL Protocol Version 3.0” , Netscape Communications Corporation, March 1996
[26]“GSM 03.20 version 7.2.0 Release 1998: Digital cellular telecommunications system (Phase 2+) ; Security Related Network Functions”, European Telecommunications Standards Institute, Nov, 1999
[27]“GSM 01.61 version 6.0.1 Release 1997: Digital cellular telecommunications system (Phase 2+) ;General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements”, European Telecommunications Standards Institute, July, 1998
[28]“WAP WTLS version 18-Feb-2000, Wireless Application Protocol: Wireless Transport Layer Security Specification”, Wireless Application Protocol Forum Ltd. |