Ticket-based service access scheme for mobile users
ACSC '02 Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4
Micropayments for Wireless Communications
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Formal Verification of the Horn-Preneel Micropayment Protocol
VMCAI 2003 Proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation
Experience from Mobile Application Service Framework in WIP
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Secure Open Systems for Protecting Privacy and Digital Services
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Weighted One-Way Hash Chain and Its Applications
ISW '00 Proceedings of the Third International Workshop on Information Security
New Key Recovery in WAKE Protocol
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Payments and banking with mobile personal devices
Communications of the ACM - Wireless networking security
Accountable Anonymous Access to Services in Mobile Communication Systems
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
A Global Ticket-Based Access Scheme for Mobile Users
Information Systems Frontiers
Anonymous access scheme for electronic-services
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs
Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Anonymous authentication scheme for wireless communications
International Journal of Mobile Communications
Efficient, anonymous, and authenticated conference key setup in cellular wireless networks
Computers and Electrical Engineering
Mobile services access and payment through reusable tickets
Computer Communications
A Generic Protocol for Controlling Access to Mobile Services
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Provably secure mobile key exchange: applying the Canetti-Krawczyk approach
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A WTLS handshake protocol with user anonymity and forward secrecy
CIC'02 Proceedings of the 7th CDMA international conference on Mobile communications
Privacy-enhanced Key Recovery in mobile communication environments
The Journal of Supercomputing
Self-certified mutual authentication and key exchange protocol for roaming services
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Mutual authentication and key exchange protocols with anonymity property for roaming services
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
Security and Communication Networks
Hi-index | 0.00 |