How to break fraud-detectable key recovery
ACM SIGOPS Operating Systems Review
Second generation mobile and wireless networks
Second generation mobile and wireless networks
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Authentication and Payment in Future Mobile Systems
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Key Recovery in Third Generation Wireless Communication Systems
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Forward Secrecy and Its Application to Future Mobile Communications Security
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Distributed provers with applications to undeniable signatures
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Privacy-enhanced Key Recovery in mobile communication environments
The Journal of Supercomputing
Hi-index | 0.00 |
Wireless authentication and key establishment (WAKE) protocols are essential in mobile communications. The key recovery mechanism may also be required in mobile communication systems for the investigation of serious crimes and for national security. Recently some protocols that give key recovery in the WAKE protocol have been published. In this paper we propose new key recovery protocols that improve previous protocols in security and efficiency.