Article Fingerprint
ReserarchID
87058
into WiMAX but it still facing a lot of challenging situations. This paper shows that, GTEK Hash chain algorithm for Multi and Broadcast service of IEEE 802.16e facing a reduced forward secrecy problem. These vulnerabilities are the possibilities to forge key messages in Multi-and Broadcast operation, which are susceptible to forgery and reveals important management information. In this paper, we also propose three UAKE protocols with PFS (Perfect Forward Secrecy) that are efficient and practical for mobile devices.
A.K.M. Nazmus Sakib. 1970. \u201cSecure Authentication & Key Establishment protocol with perfect Forward Secrecy for Multi and Broad cast service in IEEE 802.16e\u201d. Unknown Journal GJCST Volume 11 (GJCST Volume 11 Issue 16): .
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 105
Country: Unknown
Subject: Uncategorized
Authors: A.K.M. NAZMUS SAKIB,Fariha Tasmin Jaigirdar, Samiur Rahman, Tanvir Mahmud ,Muhammad Mushfiqur Rahman (PhD/Dr. count: 0)
View Count (all-time): 158
Total Views (Real + Logic): 20576
Total Downloads (simulated): 11005
Publish Date: 1970 01, Thu
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
into WiMAX but it still facing a lot of challenging situations. This paper shows that, GTEK Hash chain algorithm for Multi and Broadcast service of IEEE 802.16e facing a reduced forward secrecy problem. These vulnerabilities are the possibilities to forge key messages in Multi-and Broadcast operation, which are susceptible to forgery and reveals important management information. In this paper, we also propose three UAKE protocols with PFS (Perfect Forward Secrecy) that are efficient and practical for mobile devices.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.