메뉴 건너뛰기




Volumn , Issue , 2008, Pages

A provable-security mutual authenticated key agreement protocol for mobile communication

Author keywords

Authentication; Identity key agreement protocol; Matching conversation; Secure AK protocol

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMMUNICATION; MOBILE TELECOMMUNICATION SYSTEMS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 58049129400     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WiCom.2008.1145     Document Type: Conference Paper
Times cited : (2)

References (6)
  • 4
    • 0347124644 scopus 로고    scopus 로고
    • National Security Agency, Available at
    • National Security Agency. SKIPJACK and KEA algorithm specification. 1998. Available at http://csrc.nist.gov/encryption/skipjack-kea.htm
    • (1998) SKIPJACK and KEA algorithm specification
  • 6
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • Proceedings of the sixth IMA international conference on cryptography and coding, Heidelberg: Springer-Verlag
    • Blake-Wilson, D. Johnson, A. Menezes. Key agreement protocols and their security analysis. Proceedings of the sixth IMA international conference on cryptography and coding, LNCS 1355. Heidelberg: Springer-Verlag, 1997. 30-45.
    • (1997) LNCS , vol.1355 , pp. 30-45
    • Wilson, B.1    Johnson, D.2    Menezes, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.