Efficient Mobile Node Authentication Scheme Based on the Trusted Local Third Party in Mobile Computing Environments 


Vol. 25,  No. 4, pp. 528-538, Apr.  2000


PDF
  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

노환주 and 이기현, "Efficient Mobile Node Authentication Scheme Based on the Trusted Local Third Party in Mobile Computing Environments," The Journal of Korean Institute of Communications and Information Sciences, vol. 25, no. 4, pp. 528-538, 2000. DOI: .

[ACM Style]

노환주 and 이기현. 2000. Efficient Mobile Node Authentication Scheme Based on the Trusted Local Third Party in Mobile Computing Environments. The Journal of Korean Institute of Communications and Information Sciences, 25, 4, (2000), 528-538. DOI: .

[KICS Style]

노환주 and 이기현, "Efficient Mobile Node Authentication Scheme Based on the Trusted Local Third Party in Mobile Computing Environments," The Journal of Korean Institute of Communications and Information Sciences, vol. 25, no. 4, pp. 528-538, 4. 2000.