Proceedings of 2nd IEEE International Conference on Universal Personal Communications
DOI: 10.1109/icupc.1993.528374
|View full text |Cite
|
Sign up to set email alerts
|

A novel method for key exchange and authentication with cellular network applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…In order to meet these requirements, cryptographic techniques should also be carefully chosen. Prior works on security issues in mobile communication systems can be found in Tatebayashi et al (1990), Hwang (1993), Coomaraswamy and Kumar (1993), Beller et al (1993), Ashar and Diffie (1994), Lin and Harn (1993) and Molva et al (1994). Most of these works are done for point-to-point communications.…”
Section: Introductionmentioning
confidence: 99%
“…In order to meet these requirements, cryptographic techniques should also be carefully chosen. Prior works on security issues in mobile communication systems can be found in Tatebayashi et al (1990), Hwang (1993), Coomaraswamy and Kumar (1993), Beller et al (1993), Ashar and Diffie (1994), Lin and Harn (1993) and Molva et al (1994). Most of these works are done for point-to-point communications.…”
Section: Introductionmentioning
confidence: 99%