2[1]Special issue on mobile and wireless computing networks[J]. IEEE Journal on Selected Areas in Communications, 1995, 13(5): 839-923.
3[2]MOLVA R, SAMFAT D, TSUDIC G. Authentication of mobile users[J], IEEE Network, 1994, 8(2): 26-34.
4[3]MOHAN S. Privacy and authentication protocols for PCS[J], IEEE personal communications magazine, 1996, 3(5):34-38.
5[4]HARN L, LIN H. Modifications to enhance the security of GSM[A]. 5th Nat Conf on Information Security[C]. Taiwan, May 1995. 97-100.
6[5]FRANKEL Y, HERZBERG A, et al. Security issues in a CDPD wireless network [J]. IEEE Personal Communications Magazine, 1995, 2(4): 16-27.
7[6]BELLOVIN S M, MERRIT M. Limitation of the Kerberos authentication system [J], Computer Communication Review, 1990, 20(5): 119-132.
8[7]COX B, TYGAR J D. Netbill security and transaction protocol[A]. Proceedings of the First USENIX Workshop in Electronic Commerce[C], Unite States, July 1995. 77-78.
9[8]REVEST R L, SHAMIR A. Payword and MicroMint: Two Simple Micropayment Schemes[S], Security Protocol, LCNS 1361, M. Lomas, ED, Springer-Verlag, 1997. 69-87.
10[9]AGNEW,et al. Improved digital signature scheme based on discrete exponentiation[J]. Electronics Letters,1995,26(14):1024-1025.
1Rivest R, Shamir A. Payword and Micromint: Two Simple Micropayment Protocols[C]//Proceedings of International Workshop on Security Protocols. Berlin, Germany: Springer-Verlag, 1996.
2Haller N, Metz C, Nesser P, et al. A One-time Password System[S]. RFC 2289, 2005.
3Asokan N. Fairness in Electronic Commerce[D]. Waterloo, Canada: University of Waterloo, 1998,