Login / Signup
An optimized authentication protocol for mobile networks.
Mir-Kamran Mahshid
Reza Eslamipoor
Published in:
Neural Comput. Appl. (2014)
Keyphrases
</>
mobile networks
authentication protocol
smart card
mobile users
security analysis
mobile devices
lightweight
wireless networks
ad hoc networks
public key
base station
security protocols
rfid tags
secret key
rfid systems
routing problem
databases
multimedia content
end to end
routing protocol