We analyse several well-known key establishment protocols for mobile communications. The protocols are examined with respect to their security and suitability in mobile environments. In a number of cases weaknesses are pointed out, and in many cases refinements are suggested, either to improve the efficiency or to allow simplified security analysis.
CITATION STYLE
Boyd, C., & Mathuria, A. (1998). Key establishment protocols for secure mobile communications: A selective survey. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1438, pp. 344–355). Springer Verlag. https://doi.org/10.1007/bfb0053746
Mendeley helps you to discover research relevant for your work.