메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 79-83

Analysis and modification of ASK mobile security protocol

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL LOGIC; MOBILE TELECOMMUNICATION SYSTEMS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33744903731     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WMCS.2005.4     Document Type: Conference Paper
Times cited : (5)

References (11)
  • 1
    • 0000523051 scopus 로고
    • A Logic of Authentication
    • Proceeding of the Royal Society, December
    • M. Abadi, M. Burrows, and R. Needham. "A Logic of Authentication", Proceeding of the Royal Society, Series A, 426, 1871, pp. 233-271, December 1989.
    • (1871) Series A , vol.426 , pp. 233-271
    • Abadi, M.1    Burrows, M.2    Needham, R.3
  • 3
    • 0028272762 scopus 로고
    • Privacy and authentication for wireless local area networks
    • First Quarter
    • A. Aziz and W. Diffie, "Privacy and authentication for wireless local area networks", IEEE Personal Commun., First Quarter 25-31, 1994.
    • (1994) IEEE Personal Commun , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 7
    • 0036505541 scopus 로고    scopus 로고
    • Authentication Protocols for Mobile Network Environment Value-Added Services
    • G. Horn, K. M. Martin, and C. J. Mitchell, "Authentication Protocols for Mobile Network Environment Value-Added Services", IEEE Transactions on Vehicular Technology 51, pp.383-392, 2002.
    • (2002) IEEE Transactions on Vehicular Technology , vol.51 , pp. 383-392
    • Horn, G.1    Martin, K.M.2    Mitchell, C.J.3
  • 9
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proceedings of TACAS, number, Springer
    • G. Lowe, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR", Proceedings of TACAS, number 1055 in LNCS. Springer, 1996.
    • (1996) LNCS , vol.1055
    • Lowe, G.1
  • 11
    • 33847163312 scopus 로고    scopus 로고
    • P. Y. A. Ryan and S. A. Schneider, modelling and analysis of security protocols: the CSP Approach, Addison-Wesley, 2001.
    • P. Y. A. Ryan and S. A. Schneider, modelling and analysis of security protocols: the CSP Approach, Addison-Wesley, 2001.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.