Cryptanalysis of an optimized protocol for mobile network authentication and security
From MaRDI portal
Recommendations
- Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications.
- Impersonation attacks on a mobile security protocol for end-to-end communications
- Publication:4934712
- Cryptanalysis of a password authentication scheme over insecure networks
- Information Security and Cryptology - ICISC 2003
Cited in
(6)- Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications.
- Impersonation attacks on a mobile security protocol for end-to-end communications
- On Establishing and Fixing a Parallel Session Attack in a Security Protocol
- User-mediated authentication protocols and unforgeability in key collision
- Chain authentication in mobile communication systems
- A new authentication protocol for UMTS mobile networks
This page was built for publication: Cryptanalysis of an optimized protocol for mobile network authentication and security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1007557)