1[1]Horn G,Preneel B.Authentication and payment in future mobile systems[J].In Computer Security ESORICS'98 Proceedings,Springer-Verlag,Berlin: 1998,1 485:277-293.
2[2]Horn G,Martin K M,Mitchell C J.Authentication Protocols for mobile network environment value added services[EB/OL].http:∥isg.rhbnc.sc.uk/c jm/Listofpublications.
3[3]Mehrotra A.Mobility and security management in the GSM system and some proposed future improvements[J].Proceedings of the IEEE,1998,86(7):1 480-1 497.
4[4]Shoup V.On formal modules for secure key exchange[EB/OL].http: ∥www.shoup.net/papers,IBM Research Report RZ 3120,1999.
5[5]Park D G,Boyd C,Moon S J.Forward secrecy and Its Application to Future Mobile Communiations Security[A].PKCS2000,LNCS 1751[C].2000.433-445.
6[2]Elkeelany O, et al., Performance analysis of IPSec protocol:encryption and authentication. IEEE Communications Conference (ICC 2002), 2002:1164-1168
7[3]Xenakis C, Merakos L. Security in third generation mobile networks.Computer Communications,2004 ;27 (7): 638-650
4LI En-ling SONG Lin-hong YANG Dang-qiang XUE Ying CHU Meng.Design of 2.1GHz CMOS Low Noise Amplifier[J].The Journal of China Universities of Posts and Telecommunications,2006,13(1):71-74.