Provably Insecure Group Authentication: Not All Security Proofs are What they Claim to Be
Publisher
Springer Singapore
Reference9 articles.
1. Ahmadian Z, Jamshidpour S (2018) Linear subspace cryptanalysis of Harn’s secret sharing-based group authentication scheme. IEEE Trans Inf Forensics Secur 13(2):502–510. https://doi.org/10.1109/TIFS.2017.2757454
2. Boyd C, Mathuria A, Stebila D (2020) Protocols for authentication and key establishment. In: Information security and cryptography, 2nd edn. Springer. https://doi.org/10.1007/978-3-662-58146-9
3. Dabrowski A, Pianta N, Klepp T, Mulazzani M, Weippl ER (2014) IMSI-catch me if you can: IMSI-catcher-catchers. In: CNP Jr, Hahn A, Butler KRB, Sherr M (eds) Proceedings of the 30th annual computer security applications conference, ACSAC 2014. ACM, New Orleans, LA, USA, pp. 246–255. https://doi.org/10.1145/2664243.2664272.
4. Harn L (2013) Group authentication. IEEE Trans Comput 62(9):1893–1898. https://doi.org/10.1109/TC.2012.251
5. Khan MSA, Mitchell CJ (2017) Trashing IMSI catchers in mobile networks. In: Noubir G, Conti M, Kasera SK (eds) Proceedings of the 10th ACM conference on security and privacy in wireless and mobile networks, WiSec 2017. ACM, Boston, MA, USA, pp. 207–218. https://doi.org/10.1145/3098243.3098248