메뉴 건너뛰기




Volumn , Issue , 2007, Pages 2255-2258

Modeling of man-in-the-middle attack in the wireless networks

Author keywords

GSM; MitM; Tunneled model; Wireless networks

Indexed keywords

MATHEMATICAL MODELS; MOBILE DEVICES; NETWORK SECURITY; USER INTERFACES;

EID: 38049001489     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WICOM.2007.562     Document Type: Conference Paper
Times cited : (26)

References (7)
  • 2
    • 26444503680 scopus 로고
    • GSM 02.09: Security Aspects
    • European Telecommunications Standards Institute ETSI, June
    • European Telecommunications Standards Institute (ETSI), "GSM 02.09: Security Aspects", June 1993.
    • (1993)
  • 3
    • 0010413844 scopus 로고
    • Modifications to enhance the security of GSM
    • Information Security, Taipei, Taiwan, R.O.C, May
    • L. Harn and H. Lin, "Modifications to enhance the security of GSM" in Proc. 5th Nat. Conf. Information Security, Taipei, Taiwan, R.O.C., May 1995, pp. 74-76.
    • (1995) Proc. 5th Nat. Conf , pp. 74-76
    • Harn, L.1    Lin, H.2
  • 4
    • 0032676481 scopus 로고    scopus 로고
    • Enhanced privacy and authentication for the global system for mobile communications
    • C. H. Lee, M. S. Hwang, and W. P. Yang, "Enhanced privacy and authentication for the global system for mobile communications", Wireless Networks, vol. 5, pp. 231-243, 1999.
    • (1999) Wireless Networks , vol.5 , pp. 231-243
    • Lee, C.H.1    Hwang, M.S.2    Yang, W.P.3
  • 5
    • 79957632364 scopus 로고    scopus 로고
    • Authentication protocols for personal communication system, in Proc. ACM Special Interest Group on Data CommunicationsSIGCOMM'95, Aug. 1995, pp. 256-261
    • H. Lin and L. Harn, "Authentication protocols for personal communication system", in Proc. ACM Special Interest Group on Data Communications(SIGCOMM'95), Aug. 1995, pp. 256-261.
    • Lin, H.1    Harn, L.2
  • 6
    • 38049058623 scopus 로고    scopus 로고
    • C. Mitchell, The security of the GSM Air Interface Protocol, Univ. of London, Royal Holloway, RHUL-MA-2001-3, 2001.
    • C. Mitchell, "The security of the GSM Air Interface Protocol", Univ. of London, Royal Holloway, RHUL-MA-2001-3, 2001.
  • 7
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • Advances in Cryptology-Crypto, number 1109 in, Springer Verlag
    • M. Bellare, R. Canetti, and H. Krawczyk. "Keying Hash Functions for Message Authentication", In Advances in Cryptology-Crypto 96, number 1109 in Lecture Notes in Computer Science, pages 1-15. Springer Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.96 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.