Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Stig F. Mjølsnes
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Temporary Internet Access for Authentication and Key Agreement for LTE Networks
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Computer Networks
Communications
Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Certificateless Authenticated Two-Party Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture
International Journal of Distributed Sensor Networks
Computer Networks
Engineering
Communications
Using Physiological Signals for Authentication in a Group Key Agreement Protocol
Modular Security Proofs for Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
An Identity-Based Mutual Authentication With Key Agreement
International Journal of Trend in Scientific Research and Development
On the Security of Authenticated Group Key Agreement Protocols
Scalable Computing
Computer Science