Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference16 articles.
1. WAP Forum. (2001). Wireless application protocol wireless application specification. http://www.wapforum.org/ .
2. Downes, S. (2005). Authentication and identification. International Journal of Instructional Technology and Distance Learning, 2(10), ISSN 1550-6908.
3. Kaliski B. (2001) An unknown key-share attack on the MQV key agreement protocol. ACM Transaction on Information and System Security 4(3): 275–288
4. Bhansali, B. B. (2001). Man-in-the-middle Attack. 16 February 2001.
5. Park, D. G., Boyd, C., & Moon, S.-J. (2000). Forward secrecy and its application to future mobile communications security. Public Key Cryptography 2000, LNCS1751, Spring-Verlag, pp. 433–445.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献