Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications (Q3556605): Difference between revisions
From MaRDI portal
Set profile property. |
ReferenceBot (talk | contribs) Changed an Item |
||
(One intermediate revision by one other user not shown) | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1007/978-3-642-04434-2_24 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W1549411822 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: New directions in cryptography / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank | |||
Normal rank |
Latest revision as of 18:09, 2 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications |
scientific article |
Statements
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications (English)
0 references
24 April 2010
0 references
mobile end-to-end communication
0 references
analysis of security protocols
0 references
impersonation attack
0 references
authentication and secrecy protocol
0 references