Security flaws in authentication and key establishment protocols for mobile communications.
Kyungah ShimYoung-Ran LeePublished in: Appl. Math. Comput. (2005)
Keyphrases
- key establishment
- authentication scheme
- mobile communications
- security flaws
- secret key
- key management
- smart card
- symmetric key
- wireless networks
- key distribution
- mobile computing
- distributed computing
- public key
- future trends
- wifi
- security protocols
- secure communication
- wireless sensor networks
- ubiquitous computing
- ad hoc networks
- sensor networks
- authentication protocol
- pairwise
- hash functions
- database systems
- data collection
- digital signature
- encryption scheme
- real time
- user authentication
- distributed environment
- rfid tags
- signature scheme