New key recovery in WAKE protocol

3Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.

Abstract

Wireless authentication and key establishment (WAKE) protocols are essential in mobile communications. The key recovery mechanism may also be required in mobile communication systems for the investigation of serious crimes and for national security. Recently some protocols that give key recovery in the WAKE protocol have been published. In this paper we propose new key recovery protocols that improve previous protocols in security and efficiency. © Springer-Verlag Berlin Heidelberg 2001.

Cite

CITATION STYLE

APA

Kim, C. H., & Lee, P. J. (2001). New key recovery in WAKE protocol. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1992, 325–338. https://doi.org/10.1007/3-540-44586-2_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free