Author: Desmedt Y
Publisher: Springer Publishing Company
ISSN: 1358-3948
Source: BT Technology Journal, Vol.23, Iss.4, 2005-10, pp. : 65-70
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Privacy Enhanced Mobile Authentication
By Køien G.
Wireless Personal Communications, Vol. 40, Iss. 3, 2007-02 ,pp. :
Robust Deniable Authentication Protocol
By Yoon Eun-Jun
Wireless Personal Communications, Vol. 55, Iss. 1, 2010-09 ,pp. :
Authentication with P2P Agents
BT Technology Journal, Vol. 21, Iss. 4, 2003-10 ,pp. :
Protecting File Systems with Transient Authentication
By Corner Mark
Wireless Networks, Vol. 11, Iss. 1-2, 2005-01 ,pp. :
An efficient authentication protocol for mobile communications
Telecommunication Systems, Vol. 46, Iss. 1, 2011-01 ,pp. :