메뉴 건너뛰기




Volumn 2, Issue , 2010, Pages 1469-1473

The vulnerability analysis and improvement of the TETRA authentication protocol

Author keywords

Authentication; Authentication key; ISSI; TETRA; TRS

Indexed keywords

AUTHENTICATION PROTOCOLS; AUTHENTICATION SERVICES; CHALLENGE RESPONSE PROTOCOLS; EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTES; TERMINAL EQUIPMENT; VULNERABILITY ANALYSIS;

EID: 77952489027     PISSN: 17389445     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (5)
  • 4
    • 77952527013 scopus 로고    scopus 로고
    • TETRA MoU SFPG Recommendation 02 edition 4, October
    • TETRA MoU SFPG Recommendation 02 edition 4, "End-to-End Encryption", October 2004.
    • (2004) End-to-End Encryption
  • 5
    • 77952521348 scopus 로고    scopus 로고
    • TETRA MoU SFPG Recommendation 01 edition 4, February
    • TETRA MoU SFPG Recommendation 01 edition 4, "TETRA Key Distribution", February 2006.
    • (2006) TETRA Key Distribution


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.