Handbook of Applied Cryptography
Handbook of Applied Cryptography
Author's reply to "comments on an optimized protocol for mobile network authentication and security"
ACM SIGMOBILE Mobile Computing and Communications Review
An optimized authentication protocol for mobile network reconsidered
ACM SIGMOBILE Mobile Computing and Communications Review
Cryptanalysis of an optimized protocol for mobile network authentication and security
Information Processing Letters
Improvement on an optimized protocol for mobile network authentication and security
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Hi-index | 0.00 |
The level of network authentication and security offered by a protocol proposed in [3] is considered