메뉴 건너뛰기




Volumn 2, Issue , 2004, Pages 347-350

A new efficient MAKEP for wireless communications

Author keywords

Key distribution; Key exchange; Man in the middle attack; Mutual authentication; Wireless network

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; INFORMATION ANALYSIS; PARAMETER ESTIMATION; SECURITY OF DATA; SERVERS;

EID: 3042646123     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (6)
  • 1
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Proc. CRYPTO 93, D. R. Stinson, Ed., Springer
    • M. BELLARE, and P. ROGAWAY, "Entity authentication and key distribution", Proc. CRYPTO 93 (1994), D. R. Stinson, Ed., Springer, Lecture Notes in Computer Science No. 773, pp. 232-249
    • (1994) Lecture Notes in Computer Science , Issue.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 0001940580 scopus 로고
    • Provably secure session key distribution - The three party case
    • Las Vegas, ACM
    • M. BELLARE, and P. ROGAWAY, "Provably secure session key distribution - the three party case", Proc. 27th ACM Symp. on Theory of Computing (Las Vegas, 1995), ACM, pp 57-66
    • (1995) Proc. 27th ACM Symp. on Theory of Computing , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Dec.
    • R.M. NEEDHAM, and M.D. SCHROEDER, "Using encryption for authentication in large networks of computers", Communications of the ACM 21, 12 (Dec. 1978), pp. 993-999
    • (1978) Communications of the ACM 21 , vol.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 5
    • 0037942544 scopus 로고    scopus 로고
    • Cryptanalysis of mutual authentication and key exchange for low power wireless communications
    • K. Shim, "Cryptanalysis of Mutual Authentication and Key Exchange for Low Power Wireless Communications", IEEE Communications Letters, Vol. 7, No.5, pp.248-250, 2003
    • (2003) IEEE Communications Letters , vol.7 , Issue.5 , pp. 248-250
    • Shim, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.