作者: Slawomir Grzonkowski , Peter M. Corcoran , Thomas Coughlin
DOI: 10.1109/ICCE-BERLIN.2011.6031855
关键词:
摘要: A number of well-known authentication protocols are considered in the context of next-generation mobile and CE network services. The potential weaknesses of current protocols …