Chain authentication in mobile communication systems
From MaRDI portal
Recommendations
- Scheme for secure digital mobile communications based on symmetric key cryptography
- Cryptanalysis of an optimized protocol for mobile network authentication and security
- scientific article; zbMATH DE number 1189394
- scientific article; zbMATH DE number 1808265
- scientific article; zbMATH DE number 2048537
Cited in
(9)- Mobile communications world: Security implementations aspects -- a state of the art
- Establishment of the secure channel between broker nodes in pub/sub system
- A simple mobile communication billing system among charged parties
- Authentication scheme for mobile OFDM based on security information technology of physical layer over time-variant and multipath fading channels
- A self-verification authentication mechanism for mobile satellite communication systems
- On performance analysis of challenge/response based authentication in wireless networks
- Scheme for secure digital mobile communications based on symmetric key cryptography
- scientific article; zbMATH DE number 1756683 (Why is no real title available?)
- scientific article; zbMATH DE number 1808265 (Why is no real title available?)
This page was built for publication: Chain authentication in mobile communication systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1854805)