Subject
Law,Hardware and Architecture,Software
Reference23 articles.
1. Using encryption for authentication in large networks of computers;Needham;Communication of ACM,1978
2. Authentication of mobile users;Molva;IEEE Network Special Issue on Mobile Communications,1994
3. Solutions to the GSM Security Weaknesses;Toorani,2008
4. Extensions to an authentication technique proposed for the global mobility network;Buttyan;IEEE Transactions on Communications,2000
5. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks;Jiang;IEEE Transactions on Wireless Communications,2006
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献