共 25 条
- [1] (1999)
- [2] (2002)
- [3] (2001)
- [4] Information technology-Security techniques-Entity authentication-Part4: Mechanisms using a cryptographic check function
- [5] Lin Y.B., Chen Y.K., Reducing authentication signaling traffic in third-gerneraion mobile network, IEEE Trans. on Wireless Communications, 2, 3, pp. 493-501, (2003)
- [6] Saraireh J.A., Yousef S., Analyses authentication and key agreement protocol for UMTS mobile networks, Proc. of the 1st Int'l Conf. on Mobile Computing and Wireless Communication, pp. 27-31, (2006)
- [7] Wu L.Y., Lin Y.B., Authentication vector management for UMTS, IEEE Trans. on Wireless Communications, 6, 11, pp. 4101-4107, (2007)
- [8] Huang C.M., Li J.W., Authentication and key agreement protocol for UMTS with low bandwidth consumption, Proc. of the 19th Int'l Conf. on Advanced Information Networking and Applications, pp. 392-397, (2005)
- [9] Saraireh J.A., Yousef S., Extension of authentication and key agreement protocol (AKA) for universal mobile telecommunication system (UMTS), Int'l Journal of Theoretical and Applied Computer Sciences, 1, 1, pp. 109-118, (2006)
- [10] Lee C.C., Hwang M.S., Yang W.P., Extension of authentication protocol for GSM, IEE Proc. of Communications, 150, 2, pp. 91-95, (2003)