Designing Authentication Protocols for Third Generation Mobile Communication Systems.
Shu-Min ChengShiuh-Pyng ShiehWen-Her YangFu-Yuan LeeJia-Ning LuoPublished in: J. Inf. Sci. Eng. (2005)
Keyphrases
- communication systems
- authentication protocol
- communication technologies
- information processing systems
- computer systems
- blind equalization
- multiple access
- smart card
- security analysis
- public key
- channel estimation
- rfid systems
- mobile communication
- mobile devices
- lightweight
- context aware
- security protocols
- rfid tags
- software engineering
- ban logic
- query processing