Cryptanalysis of a hybrid authentication protocol for large mobile networks
暂无分享,去创建一个
[1] Chris J. Mitchell. Security for Mobility , 2003 .
[2] Ravi Ganesan,et al. Yaksha: augmenting Kerberos with public key cryptography , 1995, Proceedings of the Symposium on Network and Distributed System Security.
[3] Bahram Honary,et al. Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems , 1999 .
[4] Daniel E. Geer,et al. Project Athena as a distributed computer system , 1990, Computer.
[5] J. Davenport. Editor , 1960 .
[6] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[7] Hung-Yu Chien,et al. A hybrid authentication protocol for large mobile network , 2003, J. Syst. Softw..
[8] Armando Fox,et al. Security on the move: indirect authentication using Kerberos , 1996, MobiCom '96.
[9] Shiuh-Pyng Shieh,et al. An Efficient Authentication Protocol for Mobile Networks , 1999, J. Inf. Sci. Eng..
[10] Marvin A. Sirbu,et al. Distributed authentication in Kerberos using public key cryptography , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[11] Stephen T. Kent,et al. A public‐key based secure Mobile IP , 1999, Wirel. Networks.
[12] Randy Chow,et al. An efficient and secure authentication protocol using uncertified keys , 1995, OPSR.