Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications (Q3556605): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-04434-2_24 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1549411822 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank

Latest revision as of 18:09, 2 July 2024

scientific article
Language Label Description Also known as
English
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications
scientific article

    Statements

    Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications (English)
    0 references
    0 references
    0 references
    0 references
    24 April 2010
    0 references
    mobile end-to-end communication
    0 references
    analysis of security protocols
    0 references
    impersonation attack
    0 references
    authentication and secrecy protocol
    0 references

    Identifiers