[ 1 ] W A P Forum.Wi reless application protocol wireless t ransport layer securi ty specifi cation.Version 06-Apr-2001. [ 2 ] C Gunther.An identity-based key-exchange protocol.In :Advances in Cryptology-Eurocrypto89.Springer-Verlag, 1990.29—37. [ 3 ] W Diffie, P van Oorschot, M Wiener.Authentication and authenticated key exchanges.Designs Codes and Cryptography.1992.2 :107—125. [ 4 ] M Bel lare, S K Miner.A forward-secure digital signature scheme.In :Advances in Cryptology-Crypto99.Springer-Verlag, 1999. [ 5 ] DongGook Park, Colin Boyd, Sang-Jae Moon.Forward secrecy and i ts application to future mobile communications security.PKC2000, LNCS1751.Spring-Verlag, 2000.433 —445. [ 6 ] K Lee, S Moon.AKA protocols for mobi le communications.In :Proceedings of 6th Aust ralasian Conference Information Security and Privacy ACISP2000.2000.400—411. [ 7 ] K Lee, S Moon, W Jeong, T Kim.A-2-passauthentication and key agreement protocol f or mobi le communications.In :Proceedings of the2ndInternational Conference on Information Secur and Cryptology, ICISC99.1999.143 —155. [ 8 ] F Bao, R H Deng.A signcryption scheme with signature di rect ly verifiable by public key.In :Proc of PKC98, LNCS 1431.1998.55—59 [ 9 ] Mitchell C J, Piper F, Wi ld P.Digital signatures.In :Cont emporary Cryptology, The Science of Information Integrity.IEEE Press,1992.325 —378 |