References
- ETSI, 'GSM Recommendations: GSM 01.02- 12.21,' Feb. 1993, Release 1992
- D. Kesdogan, H. Federrath, A. Jericow, and A. Pfizmann, 'Location Management Strategies increasing Privacy in Mobile Communication Systems,' Proc. of the 12th IFIP International Conference on Informatin Security(IFIP/SEC'96), 1996
- D. Kesdogan, P. Reichl, and K. Junghartchen, 'Distributed Temporary Pseudonyms: A New Approachfor Protecting Location Information in Mobile Communication Networks,' ESOROCS '98, LNCS vol. 1485, pp. 295-312, 1998
- S. S. Kim, S. S. Yeo, H. J. Park, and S. K. Kim, 'A New Scheme for the Location Information Protection in Mobile Communication Environments,' Proc. of the MMM-ACNS 2005: 3th International Workshop on Mathmatical Methods, Models, and Architectures for Computer Network Security, LNCS, Vol. 3685, pp. 436-441, 2005
- 김순석, '이동통신 환경에서 사용자 프라이버시 보호를 위한 새로운 이동 착호프로토콜,' 한국해양정보통신학회논문지, 제 10권 12호, pp 2193-2201, 2006
- ACTS AC095, 'ASPeCT Deliverable D02, Initial Report on Security Requirements, AC095/ATEA/W21/DS/P/02/B,' Feb. 1997, Available on-line as http://www.esat.kuleuven.ac.be/cosic/aspect/
- G. Horn and B. Preneel, 'Authentication and Payment in Future Mobile Systems,' ESORICS '98, LNCS, vol. 1485, pp. 277-293, 1998
- A. Pfitzmann, B. Pfitzmann, and M. Waidner, 'ISDN-MIXes Untraceable Communication with Very Small Bandwidth Overhead,' Proc. of the 7th IFIP International Conference on Informatin Security(IFIP/SEC'91), 1991
- H. Federrath, A. Jericow, and A. Pfitzmann, 'MIXes in Mobile Communication Systems: Location Management with Privacy,' Proc. of the Workshop on Information Hiding, 1997