- 1.M. Abrams etal. Caching proxies: limitations and potentials. In Proceedings of the Fourth International World Wide Web Conference, Boston, MA, USA, December 1995.]]Google Scholar
- 2.E. Anderson. Personal communication, May 1996.]]Google Scholar
- 3.Apple Computer, Inc. Newton internet enabler. Home page "http://devworld.apple.com/dev/newton/tools/nie.html".]]Google Scholar
- 4.A. Aziz and W. Diffie. Privacy and authentication for wireless local area networks. IEEE Personal Communications, pages 25-31, First Quarter 1994.]]Google ScholarCross Ref
- 5.H. B alakrishnan, S. Seshan, E. Amir, and R. H. Katz. Improving reliable transport and handoff performance in cellular wireless networks. ACM Wireless Networks, vol. 1, no. 4, December 1995.]] Google ScholarDigital Library
- 6.S.M. Beilovin. Personal communication, May 1996.]]Google Scholar
- 7.S.M. Bellovin and M. Memtt. Limitations of the kerberos authentication system. In Proceedings USENIX Winter Conference 1991, Dallas, Texas, USA, 1991.]]Google Scholar
- 8.C. Mic Bowman et al. The harvest information discovery and access system. In Proceedings of the Second International World Wide Web Conference, pages 763-771, Chicago, Illinois, October 1994.]]Google Scholar
- 9.Eric A. Brewer et al. The GloMop project (home page). "http://www. cs.berkeley, edu/-fox/glomop".]]Google Scholar
- 10.C. Brooks, M.S. Mazer, S. Meeks, and J. Miller. Application-specific proxy servers as http stream transducers. In Proceedings of the Fourth International World Wide Web Conference, December 1995.]]Google Scholar
- 11.D. Brown. Techniques for privacy and authentication in personal communication systems. IEEE Personal Communications, August 1995.]]Google ScholarCross Ref
- 12.M. Burrows, M. Abadi, and R. Needham. A logic of authentication. A CM Transactions on Computer Systems, 8(1): 18-36, February 1990.]] Google ScholarDigital Library
- 13.W. R. Cheswick and S. M. Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Professional Computing Series. Addison-Wesley, 1994.]] Google ScholarDigital Library
- 14.D. Cox. Wireless personal communications: What is it? IEEE Personal Communications, pages 20-35, April 1995.]]Google ScholarCross Ref
- 15.B. Doster and J. Rees. Third party authentication in the institutional file system. CITI Technical Report 92-1, Center for Information Technology Integration, University of Michigan, February 1992.]]Google Scholar
- 16.A. Fox and E.A. Brewer. Reducing WWW latency and bandwidth requirements via real-time distillation. In Proceedings of the Fifth International Worm Wide Web Conference, Paris, France, May 1996. World Wide Web Consortium.]] Google ScholarDigital Library
- 17.A. Fox, S. Gribble, E. Brewer, and E. Amir. Adapting to network and client variability via on-demand dynamic distillation. In Proceedings of the Seventh International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS- VII), Cambridge, MA, October 1996.]] Google ScholarDigital Library
- 18.Y. Frankel et al. Security issues in a cdpd wireless network. IEEE Personal Communications, 2(4): 16-27, August 1995.]]Google ScholarCross Ref
- 19.Geos operating system for PDA's (home page). "http:// www. geoworks.com/htmpages/sso.htm".]]Google Scholar
- 20.Geoworks and Nokia. Nokia 9000 communicator (home page). "http://www. geoworks.com/htmpages/9000.htm".]]Google Scholar
- 21.l. Goldberg, D. Wagner, E.A. Brewer, and P. Gauthier. Basic flaws in internet security and commerce. "http:// www. cs.berkeley.edu/~gauthier/endpoint-security, html".]]Google Scholar
- 22.S. Gribble. Real-time streams to PDA's. "http:// www. cs.berkeley.edu/~gribble/cs294- 3_multimedia/proj ect/ project.html".]]Google Scholar
- 23.T. R. Halfhill. inside the web pc. Byte Magazine, pages 44-- 56, March 1996.]]Google Scholar
- 24.IBM Corporation. IBM ARTour publications page. "http:// www. raleigh.ibm.com/art/artpub, htm".]]Google Scholar
- 25.J. Ioannidis, D. Duchamp, and G. Maguire, Jr. IP-based protocols for mobile internetworking. In Proceedings of SIGCOMM '91, pages 235-245, Zurich, Switzerland, September 199 I.]] Google ScholarDigital Library
- 26.ITU-T Recommendation v.42. International Telecommunication Union, March 93.]]Google Scholar
- 27.H. Jerome and J. Saltzer. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278- 1308, September 1975.]]Google ScholarCross Ref
- 28.A. D. Joseph et al. Rover: A toolkit for mobile information access. In Proceedings of the Fifteenth Symposium on Operating Systems Principles, Copper Mountain Resort, Colorado, December 1995.]] Google ScholarDigital Library
- 29.R. H. Katz et al. The daedalus project (home page). "http:// daedalus.cs.berkeley, edu".]]Google Scholar
- 30.J. Kohl and C. Neuman. The kerberos network authentication service (V5). Request for Comments (RFC) 1510, September 1993.]] Google ScholarDigital Library
- 31.M. Liljeberg et al. Enhanced services for world wide web in mobile WAN environment. University of Helsinki CS Technical Report No. C-1996-28, April 1996.]]Google Scholar
- 32.National Bureau of Standards. Data encryption standard. Technical Report Publication 46, Federal Information Processing Standards, 1977.]]Google Scholar
- 33.R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. CA CM, 21 ( 12):993-999, December 1978.]] Google ScholarDigital Library
- 34.Netscape Communications Corporation. The netscape proxy server (home page). "http://www. pinncomp.com/netscape/ proxy_server, html".]]Google Scholar
- 35.B.D. Noble, M. Price, and M. Satyanarayanan. A programming interface for application-aware adaptation in mobile computing. Proceedings of the Second USENIX Symposium on Mobile and Location-Independent Computing, Ann Arbor, MI, USA, April 1995.]] Google ScholarDigital Library
- 36.Ray Rischpater. Using magic cap's TCP/IP stack. PDA Developers 4.2, March/April 1996.]]Google Scholar
- 37.J. Romkey. A nonstandard for the transmission of ip datagrams over serial lines: SLIP. Request for Comments (RFC) 1055, June 1988.]] Google ScholarDigital Library
- 38.J. H. Saltzer, D.P. Reed, and D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems, vol. 2, no. 4, November 1984.]] Google ScholarDigital Library
- 39.W. Simpson, Ed. The point-to-point protocol (PPP). Request for Comments (RFC) 1661, July 1994.]] Google ScholarDigital Library
- 40.J.G. Steiner, C. Neuman, and J.I. Schiller. Kerberos: an authentication service for open network systems. In Proceedings USENIX Winter Conference 1988, pages 191- 202, Dallas, Texas, USA, February 1988.]]Google Scholar
- 41.Sony Corporation. Sony Magic Link PDA (home page). "http://www. sel.sony, conffSELJMagic/".]]Google Scholar
- 42.Sun Labs. The java language: A white paper. Available at "http://java. sun.com".]]Google Scholar
- 43.L. Wall and R. L. Schwartz. Programming perl. O'Reilly & Associates, Inc., 1991.]] Google ScholarDigital Library
- 44.World-Wide Web Consortium Security Group. A presentation on incorpating kerberos authentication into HTrP. Available at "http://www. ncsa.uiuc.edu/ InformationServer~adanVw3c/KRB 1 .HTM".]]Google Scholar
- 45.K.-P. Yee. Shoduoka mediator service. "http://www. lfw.org/ shodouka".]]Google Scholar
- 46.B. Zenel. A proxy based filtering mechanism for the mobile environment. Thesis Proposal, March 1996.]] Google ScholarDigital Library
Index Terms
- Security on the move: indirect authentication using Kerberos
Recommendations
One-move convertible nominative signature in the standard model
A nominative signature NS is a non-self-authenticating signature that is jointly generated by a signer or a nominator and a user or a nominee, but once generated, its validity can only be determined by the user. No one else including the signer can tell ...
3-Move undeniable signature scheme
EUROCRYPT'05: Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic TechniquesIn undeniable signature schemes, zero-knowledgeness and non-transferability have been identified so far. In this paper, by separating these two notions, we show the first 3-move confirmation and disavowal protocols for Chaum's undeniable signature ...
An efficient one-move Nominative Signature scheme
A signer in a Nominative Signature (NS) scheme can arbitrarily choose a nominee, then jointly generate a signature in such a way that the signature can only be verified with the nominee's consent. NS is particularly useful in user certification systems. ...
Comments