메뉴 건너뛰기




Volumn , Issue , 2007, Pages 558-563

A secure key exchange and mutual authentication protocol for wireless mobile communications

Author keywords

[No Author keywords available]

Indexed keywords

DATA PROCESSING; ELECTRONIC DATA INTERCHANGE; INFORMATION MANAGEMENT; NETWORK PROTOCOLS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 34548178552     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2007.23     Document Type: Conference Paper
Times cited : (4)

References (14)
  • 1
    • 34548154258 scopus 로고    scopus 로고
    • A Aziz, W Diffie. A secure communications protocol to prevent unauthorized access: privacy and authentication for wireless local area networks. IEEE Personal Communications (First Quarter 1994).
    • A Aziz, W Diffie. A secure communications protocol to prevent unauthorized access: privacy and authentication for wireless local area networks. IEEE Personal Communications (First Quarter 1994).
  • 2
    • 34548167325 scopus 로고    scopus 로고
    • FRETER, A. O, KARLTON, P, AND KOCHER, P. C. The SSL Protocol Version 3.0. INTERNET-DRAFT, Nov 1996
    • FRETER, A. O., KARLTON, P., AND KOCHER, P. C. The SSL Protocol Version 3.0. INTERNET-DRAFT, Nov 1996. www.netscape.com/eng/ssl3/dran302.txt.
  • 4
    • 84956866842 scopus 로고    scopus 로고
    • Unknown key-share attacks on the station-to-station (STS) protocols
    • The Second International Workshop on Practice and Theory in Public Key Cryptography-PKC'99, 1560, pp
    • S. Blake-Wilson, D. Johnson, and A Menezes, "Unknown key-share attacks on the station-to-station (STS) protocols", The Second International Workshop on Practice and Theory in Public Key Cryptography-PKC'99, LNCS 1560, pp. 154-170, 1999.
    • (1999) LNCS , pp. 154-170
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 6
    • 0034498689 scopus 로고    scopus 로고
    • Remarks on the unknown key share attacks
    • J. Baek and K. Kim, "Remarks on the unknown key share attacks," JEICE Transactions on Fundamentals, Vol. E83-A, No. 12, pp. 2766-2769.
    • JEICE Transactions on Fundamentals , vol.E83-A , Issue.12 , pp. 2766-2769
    • Baek, J.1    Kim, K.2
  • 7
    • 67649746889 scopus 로고    scopus 로고
    • An unknown key-share attack on the MQV key agreement protocol
    • B. S. Kaliski, Jr., "An unknown key-share attack on the MQV key agreement protocol," ACM Transactions on Information and System Security, Vol. 4, No. 3, pp.275-288, 2001.
    • (2001) ACM Transactions on Information and System Security , vol.4 , Issue.3 , pp. 275-288
    • Kaliski Jr., B.S.1
  • 8
    • 0037942544 scopus 로고    scopus 로고
    • Cryptanalysis of mutual authentication and key exchange for low-power wireless communications
    • K. Shim, "Cryptanalysis of mutual authentication and key exchange for low-power wireless communications," IEEE Communications Letters, Vol. 7, No. 5, pp.248-250, 2003.
    • (2003) IEEE Communications Letters , vol.7 , Issue.5 , pp. 248-250
    • Shim, K.1
  • 10
    • 34548166811 scopus 로고    scopus 로고
    • M. Girault, Self-certified public key, Advances in Cryptology-EUROCRYPT' 91, pp. 491-497, 1991
    • M. Girault, "Self-certified public key", Advances in Cryptology-EUROCRYPT' 91, pp. 491-497, 1991
  • 11
    • 34548176008 scopus 로고    scopus 로고
    • A Secure and Efficient Key Exchange Protocol for Mobile Communications
    • July
    • Fuw-Yi Yang and Jinn-Ke Jan, (2004): "A Secure and Efficient Key Exchange Protocol for Mobile Communications" Cryptology ePrint Archive 2004/167, July 2004, http://eprint.iacr.org.
    • (2004) Cryptology ePrint Archive , vol.167
    • Yang, F.1    Jan, J.2
  • 12
    • 84957794888 scopus 로고    scopus 로고
    • DongGook Park, Colin Boyd and Sang-Jae Moon. Forward Secrecy and Its Application to Future Mobile Communications Security PKC2000, LNCS1751. Spring-Verlag, 2000. 433-445
    • DongGook Park, Colin Boyd and Sang-Jae Moon. "Forward Secrecy and Its Application to Future Mobile Communications Security" PKC2000, LNCS1751. Spring-Verlag, 2000. 433-445
  • 13
    • 0017018484 scopus 로고
    • New direction in Cryptography
    • On Information Theory, Nov
    • W. Diffie an M. E. Hellman: New direction in Cryptography, IEEEETrans. On Information Theory, Vol.22, No.6, pp. 644-654, Nov. 1979.
    • (1979) IEEEETrans , vol.22 , Issue.6 , pp. 644-654
    • Diffie an, W.1    Hellman, M.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.