|
Volumn 3450, Issue , 2005, Pages 119-133
|
Exploiting empirical engagement in authentication protocol design
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CLASSIFICATION (OF INFORMATION);
COMMUNICATION CHANNELS (INFORMATION THEORY);
MATHEMATICAL MODELS;
MOBILE COMPUTING;
NETWORK PROTOCOLS;
SECURITY OF DATA;
EMPIRICAL CHANNELS;
PERVASIVE COMPUTING;
PROTOCOL DESIGNS;
SECURITY PROTOCOLS;
COMPUTER AIDED DESIGN;
|
EID: 24644483295
PISSN: 03029743
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1007/978-3-540-32004-3_14 Document Type: Conference Paper |
Times cited : (29)
|
References (9)
|