|
Volumn 2, Issue , 2010, Pages 1469-1473
|
The vulnerability analysis and improvement of the TETRA authentication protocol
|
Author keywords
Authentication; Authentication key; ISSI; TETRA; TRS
|
Indexed keywords
AUTHENTICATION PROTOCOLS;
AUTHENTICATION SERVICES;
CHALLENGE RESPONSE PROTOCOLS;
EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTES;
TERMINAL EQUIPMENT;
VULNERABILITY ANALYSIS;
NETWORK PROTOCOLS;
SECURITY OF DATA;
STANDARDS;
STRATEGIC PLANNING;
SUSTAINABLE DEVELOPMENT;
AUTHENTICATION;
|
EID: 77952489027
PISSN: 17389445
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (5)
|
References (5)
|