Authentication of Mobile Users (1994)

by Refik Molva , Didier Samfat , Gene Tsudik
Venue:IEEE Network
Citations:40 - 7 self

Documents Related by Co-Citation

2689 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
57 Privacy and authentication on a portable communications system – M J Beller, L-F Chang, Y Yacobi - 1993
22 On Travelling Incognito – A. Herzberg, H. Krawczyk, G. Tsudik - 1994
416 Security without identification: transaction systems to make Big Brother obsolete – David Chaum
260 Electronic Cash – Stefan Brands - 1998
62 Privacy And Authentication For Wireless Local Area Networks – Ashar Aziz Whitfield, Ashar Aziz, Whitfield Diffie - 1994
2445 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
860 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
103 Overview of the GSM system and protocol architecture – Moe Rahnema - 1993
19 Untraceability in Mobile Networks – Didier Samfat, Refik Molva, N. Asokan - 1995
2890 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
49 Preserving Privacy in a Network of Mobile Computers – David A. Cooper, Kenneth P. Birman
372 Kerberos: An Authentication Service for Compute Networks – B C Neuman, T Tso - 1994
296 Remote Authentication Dial – C Rigney, A Rubens, W Simpson, S Willens - 1997
35 The MD5 Message Digest Algorithm,” Internet RFC 131 – R L Rivest - 1992
18 N.(1994): Anonymity in Mobile Computing Environment – ASOKAN
970 Mobility support – D Johnson, C Perkins, J Arkko - 2004
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
82 Fast Implementations of RSA Cryptography – Shand Vuillemin, M. Shand, J. Vuillemin, A Pam - 1993