Wireless authentication and key establishment (WAKE) protocols are essential in mobile communications. The key recovery mechanism may also be required in mobile communication systems for the investigation of serious crimes and for national security. Recently some protocols that give key recovery in the WAKE protocol have been published. In this paper we propose new key recovery protocols that improve previous protocols in security and efficiency. © Springer-Verlag Berlin Heidelberg 2001.
CITATION STYLE
Kim, C. H., & Lee, P. J. (2001). New key recovery in WAKE protocol. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1992, 325–338. https://doi.org/10.1007/3-540-44586-2_24
Mendeley helps you to discover research relevant for your work.