Time, clocks, and the ordering of events in a distributed system
Communications of the ACM
Security Aspects of Mobile Communications
Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course
SKMA: a key management architecture for SCADA systems
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Hi-index | 0.00 |
In this paper a novel method for making serial number based authentication protocols resilient against database failure is described. The method is applicable to the situation where a single server wishes to authenticate itself to a number of clients, but cannot reliably maintain a sequence number database. The solution has recently been included in a draft international standard for third generation mobile telecommunications, [1].