Sciweavers

SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 10 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
ICSM
2000
IEEE
14 years 4 months ago
A Deployment System for Pervasive Computing
Software has for a long time been used for controlling different systems. Today, there is a trend towards integrating software into consumer electronics, home appliances, cars etc...
Jesper Andersson