Login / Signup
Complementing Security Breach of Authentication by Using Shared Authentication Information in Mobile WiMAX Networks.
Youngwook Kim
Hyoung-Kyu Lim
Saewoong Bahk
Published in:
IEICE Trans. Commun. (2008)
Keyphrases
</>
access control
authentication mechanism
integrity verification
security analysis
network connectivity
data encryption
mobile phone
information sharing
private information
security requirements
authentication scheme
biometric authentication