Full metadata record
DC FieldValueLanguage
dc.contributor.authorLee, CCen_US
dc.contributor.authorYang, CCen_US
dc.contributor.authorHwang, MSen_US
dc.date.accessioned2014-12-08T15:40:09Z-
dc.date.available2014-12-08T15:40:09Z-
dc.date.issued2003-11-01en_US
dc.identifier.issn1074-5351en_US
dc.identifier.urihttp://dx.doi.org/10.1002/dac.617en_US
dc.identifier.urihttp://hdl.handle.net/11536/27425-
dc.description.abstractIn this papecr. we propose a new privacy and authentication scheme for end-to-end mobile users. There are three goals in our scheme. The first allows two end-to-end mobile users to communicate privately each other. The second allows two end-to-end mobile users to distribute a session key simply. The third allows two end-to-end mobile users to mutually authenticate. Copyright (C) 2003 John Wiley Sons, Ltd.en_US
dc.language.isoen_USen_US
dc.subjectauthenticationen_US
dc.subjectmobile communicationen_US
dc.subjectprivacyen_US
dc.subjectsecurityen_US
dc.titleA new privacy and authentication protocol for end-to-end mobile usersen_US
dc.typeArticleen_US
dc.identifier.doi10.1002/dac.617en_US
dc.identifier.journalINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMSen_US
dc.citation.volume16en_US
dc.citation.issue9en_US
dc.citation.spage799en_US
dc.citation.epage808en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000186833800002-
dc.citation.woscount9-
Appears in Collections:Articles


Files in This Item:

  1. 000186833800002.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.