共 29 条
[1]
Goldreich O.(1998)Self-delegation with Controlled Propagation-or-What If You Lose Your Laptop Proceedings of Crypto 98 1462 153-168
[2]
Pftzmann B.(1990)Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms Proceedings of Auscrypt '90 453 246-264
[3]
Rivest R.L.(2003)The Overview of the New Generation Mobile Communication System and the Role of Software Defined Radio Technology IEICE Transactions on Communication 12 3374-3384
[4]
Chaum D.(2004)Scalable Mobile Ethernet and Fast Vertical Handover Proceedings of the IEEE Wireless Communications and Networking Conference 2004 A27 3-583
[5]
Harada H.(2003)A Secure Service Architecture for Beyond 3G Wireless Network WPMC2003 V2 579-195
[6]
Kuroda M.(2003)Design and Evaluation of Security Architecture for Beyond 3G Mobile Terminals WPMC2003 V1 191-331
[7]
Morikawa H.(2003)Double Stuff Security for Beyond 3G Wireless Network WPMC2003 V2 327-168
[8]
Wakana H.(1998)Self-Delegation with Controlled Propagation-or-What If You Lose Your Laptop Proceedings of Crypto 98 1462 153-undefined
[9]
Adachi F.(undefined)undefined undefined undefined undefined-undefined
[10]
Kuroda M.(undefined)undefined undefined undefined undefined-undefined