2011
DOI: 10.5121/iju.2011.2201
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Secure Authentication and Key Agreement Protocol

Abstract: In the UMTS Authentication and Key Agreement (AKA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Formal verification is the use of mathematical techniques to ensure that a certain design conforms to some precisely expressed notion of functional correctness. The absence of formal methods for verification of security protocols could lead to security errors remaining undetected [13]. Moreover, formal verification techniques can provide a systematic way of discovering protocol flaws [14] [20].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Formal verification is the use of mathematical techniques to ensure that a certain design conforms to some precisely expressed notion of functional correctness. The absence of formal methods for verification of security protocols could lead to security errors remaining undetected [13]. Moreover, formal verification techniques can provide a systematic way of discovering protocol flaws [14] [20].…”
Section: Introductionmentioning
confidence: 99%
“…Nashwan and Alshammari; BJMCS, 22(1),[1][2][3][4][5][6][7][8][9][10][11][12][13][14] 2017; Article no.BJMCS.32744 Indirect Mutual Authentication (ATM Terminal -CIFI)…”
mentioning
confidence: 99%
“…The structure of the MCAP is based on the concepts of AKA [18] which include mutual authentication and key agreement. The mutual authentication means that users identify and prove themselves to the system and the same thing for the opposite direction in which the system identifies and proves itself to the user [19].…”
Section: International Journal Of Computer and Communication Engineermentioning
confidence: 99%
“…It also has to meet the ATM Security Specifications described in [15]- [17]. The MCAP is developed based on Authentication and Key Agreement protocol (AKA) concepts [18], [19].…”
Section: Introductionmentioning
confidence: 99%