Deposit-case attack against secure roaming
A secure roaming protocol involves three parties: a roaming user, a visiting foreign server and the user’s home server. The protocol allows the user and the foreign server to establish a session key and carry out mutual authentication with the help of the home server. In the mutual authentication, u...
Saved in:
Main Authors: | YANG, Guomin, WONG, Duncan S., DENG, Xiaotie |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2005
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7440 https://ink.library.smu.edu.sg/context/sis_research/article/8443/viewcontent/Deposit_case_attack_against_secure_roaming.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Efficient anonymous roaming and its security analysis
by: YANG, Guomin, et al.
Published: (2005) -
Anonymous and authenticated key exchange for roaming networks
by: YANG, Guomin, et al.
Published: (2007) -
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
by: WEN, Fengtong, et al.
Published: (2013) -
Universal authentication protocols for anonymous wireless communications
by: Yang, G., et al.
Published: (2014) -
n PAKE+: a tree-based group password-authenticated key exchange protocol using different passwords
by: WAN, Zhiguo, et al.
Published: (2009)