![]() |
Volumn 14, Issue 4, 2010, Pages 366-368
|
Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS
|
Author keywords
AKA; Authentication; Key agreement; UMTS
|
Indexed keywords
AUTHENTICATION AND KEY AGREEMENTS;
AUTHENTICATION KEY AGREEMENT;
CONGENITAL DEFECTS;
DENIAL OF SERVICE ATTACKS;
IMPERSONATION ATTACK;
SECURITY ANALYSIS;
SECURITY WEAKNESS;
AUTHENTICATION;
COMPUTER CRIME;
NETWORK PROTOCOLS;
NETWORK SECURITY;
|
EID: 77950642661
PISSN: 10897798
EISSN: None
Source Type: Journal
DOI: 10.1109/LCOMM.2010.04.092279 Document Type: Article |
Times cited : (19)
|
References (5)
|