![]() |
Volumn , Issue , 2007, Pages
|
A new hybrid approach of symmetric/asymmetric authentication protocol for future mobile networks
|
Author keywords
3rd generation mobile networks; Authentication mechanism; End to end mobile security and mobile security requirements
|
Indexed keywords
ACCESS CONTROL;
AUTHENTICATION;
CELLULAR TELEPHONE SYSTEMS;
COMMUNICATION SYSTEMS;
COMPUTER CRIME;
CRYPTOGRAPHY;
MOBILE COMPUTING;
MOBILE TELECOMMUNICATION SYSTEMS;
NETWORK PROTOCOLS;
RADIO BROADCASTING;
TELECOMMUNICATION SYSTEMS;
VIDEO STREAMING;
WIRELESS TELECOMMUNICATION SYSTEMS;
AUTHENTICATION PROTOCOLS;
AUTHENTICATION SCHEMES;
AUTHENTICATION TIME;
CALL SETUPS;
GUESSING ATTACKS;
HYBRID APPROACHES;
INTERNATIONAL CONFERENCES;
MESSAGE EXCHANGING;
MOBILE COMMUNICATION SYSTEMS;
MOBILE NETWORKS;
MOBILE SYSTEMS;
NETWORK ATTACKS;
REPLAY ATTACKS;
SECURITY REQUIREMENTS;
SYMMETRIC CRYPTOSYSTEM;
THIRD GENERATION (3G) MOBILE SYSTEMS;
THIRD GENERATION MOBILE COMMUNICATION SYSTEMS;
TRAFFIC DELAYS;
WIRELESS NETWORKS;
|
EID: 47049086007
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/WIMOB.2007.4390823 Document Type: Conference Paper |
Times cited : (9)
|
References (11)
|