Authentication of Mobile Users (1994)

by Refik Molva , Didier Samfat , Gene Tsudik
Venue:IEEE Network
Citations:40 - 7 self

Documents Related by Co-Citation

2714 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
57 Privacy and authentication on a portable communications system – M J Beller, L-F Chang, Y Yacobi - 1993
417 Security without identification: transaction systems to make Big Brother obsolete – David Chaum
260 Electronic Cash – Stefan Brands - 1998
22 On Travelling Incognito – A. Herzberg, H. Krawczyk, G. Tsudik - 1994
62 Privacy And Authentication For Wireless Local Area Networks – Ashar Aziz Whitfield, Ashar Aziz, Whitfield Diffie - 1994
2468 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
104 Overview of the GSM Systems and Protocol Architecture – M Rahnema - 1993
2913 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
49 Preserving Privacy in a Network of Mobile Computers – David A. Cooper, Kenneth P. Birman
864 Using encryption for authentication in large networks of computers – R M Needham, M D Schroeder
297 Remote Authentication Dial – C Rigney, S Willens, A Rubens, W Simpson - 2000
35 The MD5 Message Digest Algorithm,” Internet RFC 131 – R L Rivest - 1992
18 N.(1994): Anonymity in Mobile Computing Environment – ASOKAN
974 Mobility support – D B Johnson, C E Perkins, J Arkko - 2004
1138 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
83 Fast Implementations of RSA Cryptography – Shand Vuillemin, M. Shand, J. Vuillemin, A Pam - 1993
114 SKEME: A Versatile Secure Key Exchange Mechanism for Internet – Hugo Krawczyk - 1996
15 Security issues in a CDPD wireless network – Y Frankel, A Herzberg, P A Karger, H Krawczyk, C A Kunzinger, M Yung - 1995