Security analysis on a conference scheme for mobile communications.
Zhiguo WanFeng BaoRobert H. DengAkkihebbal L. AnandaPublished in: IEEE Trans. Wirel. Commun. (2006)
Keyphrases
- security analysis
- mobile communications
- smart card
- security requirements
- public key
- mobile computing
- mutual authentication
- authentication protocol
- authentication scheme
- distributed computing
- wireless networks
- wifi
- encryption scheme
- future trends
- user authentication
- ubiquitous computing
- mobile devices
- mobile agents
- computational intelligence
- open issues
- multi agent systems
- multi agent