1995
DOI: 10.1109/98.403452
|View full text |Cite
|
Sign up to set email alerts
|

Techniques for privacy and authentication in personal communication systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
40
0

Year Published

1999
1999
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 76 publications
(43 citation statements)
references
References 1 publication
1
40
0
Order By: Relevance
“…Laboratory [8], has shown the importance of siting thermocouple leads along isotherms to minimise thermal conduction along them.…”
Section: Discussionmentioning
confidence: 99%
“…Laboratory [8], has shown the importance of siting thermocouple leads along isotherms to minimise thermal conduction along them.…”
Section: Discussionmentioning
confidence: 99%
“…So far, many of the current researches pay their attention on how to provide a secure, robust, efficient security scheme to the existing confidentiality protocol [1,3,6,8,9,10,16,17,18,20,21,22] † . However, none of them achieves the † Since the UMTS is the descendant of GSM, we consider that many of these protocols can be inherited by the UMTS.…”
Section: The Proposed Schemementioning
confidence: 99%
“…The authentieation of the telephone placing the call was implemented through a Number Assignment Module (NAM) and an Electronic Serial Number (ESN) [5]. Since ESN and phone number are transmitted in clear in these systems, it would be very easy to clone the phone and thus cause several millions of dollars loss of benefit to operators every year.…”
Section: Introductionmentioning
confidence: 99%