메뉴 건너뛰기




Volumn 4, Issue 3, 1997, Pages 40-44

Weaknesses of north american wireless authentication protocol

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CELLULAR TELEPHONE SYSTEMS; CRYPTOGRAPHY; NETWORK PROTOCOLS; SECURITY OF DATA; TELECOMMUNICATION SERVICES;

EID: 0031170116     PISSN: 10709916     EISSN: None     Source Type: Journal    
DOI: 10.1109/98.589266     Document Type: Article
Times cited : (22)

References (8)
  • 4
    • 0024014116 scopus 로고
    • Protocol Failures in Cryptosystems
    • May
    • J. Moore, "Protocol Failures in Cryptosystems," Proc. IEEE, vol. 76, no. 5, May 1988.
    • (1988) Proc. IEEE , vol.76 , Issue.5
    • Moore, J.1
  • 5
    • 0024012468 scopus 로고
    • Cryptanalysis: A Survey of Recent Results
    • May
    • E. Brickell and A. Odlyzko, "Cryptanalysis: A Survey of Recent Results," Proc. IEEE, vol. 76, no. 5, May 1988.
    • (1988) Proc. IEEE , vol.76 , Issue.5
    • Brickell, E.1    Odlyzko, A.2
  • 7
    • 0029359261 scopus 로고
    • Techniques for Privacy and Authentication in Personal Communication Systems
    • Aug.
    • D. Brown, "Techniques for Privacy and Authentication in Personal Communication Systems," IEEE Pers. Commun., vol. 2, no. 4, Aug. 1995.
    • (1995) IEEE Pers. Commun. , vol.2 , Issue.4
    • Brown, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.