3G.Horn and B.Preneel,Authentication and Payment in future mobile systems[C].J.-J.Quisquater et al.,(Eds.):ESORICS'98,LNCS 1485,Springer-Verlag,1998,175~191.
4M.Aydos,et al.,High-Speed Implementation of an ECC-based Wireless Authentication Protocol on an ARM Microprocessor[C].IEE Proceedings:Communications,2001,148(5):273~279.
5G.Horn,K.M.Martin and C.J.Mitchell,Authentication Protocols for Mobile Network Environment Value-Added Services[C].IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,2002,Vol.51 (2):247~280.
6Hung-Min Sun,Cryptanalysis of Aydos et al.,'s ECC-Based wireless Authentication Protocol[C].Proceedings of the 2004 IEEE international Conference on e-Technology,e-Commerce and e-Service (EEE'04).IEEE Computer Society,2004.
8A.Menezes,et al.,Handbook of Applied Cryptography[M].Boca Raton,FL:CRC Press,1997,489~534.
9Colin Boyd,Protocols for Authentication and key Establishment[M].Berlin:Springer-Vergles press,2003,300~370.
10M.Aydos,B.Sunar and C.K.Koc.An Elliptic Curve Cryptography based Authentication and Key Agreement Protocol for Wireless Communication[C],Workshop Discrete Algorithms and Methods for Mobility (DIAL'98),Dallas,TX.Oct.1998