Cart (Loading....) | Create Account
Close category search window

Cryptanalysis of mutual authentication and key exchange for low power wireless communications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
1 Author(s)
Kyungah Shim ; Cryptographic Technol. Team, Korea Inf. Security Agency, Seoul, South Korea

This article shows that the mutual authentication and key exchange protocols for low power wireless communications due to Wong and Chan (see Proc. IEEE MILCOM 2001 Conf., vol.1, p.39-43, Oct. 2001) are insecure against unknown key-share attacks.

Published in:

Communications Letters, IEEE  (Volume:7 ,  Issue: 5 )

Date of Publication:

May 2003

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.