Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/itcs2/JeonKLW12
%A Jeon, Woongryul
%A Kim, Jeeyeon
%A Lee, Youngsook
%A Won, Dongho
%B ITCS
%D 2012
%E Park, James Jong Hyuk
%E Kim, Jongsung
%E Zou, Deqing
%E Lee, Yang Sun
%I Springer
%K dblp
%P 225-231
%T Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity.
%U http://dblp.uni-trier.de/db/conf/itcs2/itcs2012.html#JeonKLW12
%V 180
%@ 978-94-007-5082-1
@inproceedings{conf/itcs2/JeonKLW12,
added-at = {2019-01-09T00:00:00.000+0100},
author = {Jeon, Woongryul and Kim, Jeeyeon and Lee, Youngsook and Won, Dongho},
biburl = {https://www.bibsonomy.org/bibtex/22de287d6e7ee8bf5305281c6576cd23c/dblp},
booktitle = {ITCS},
crossref = {conf/itcs2/2012},
editor = {Park, James Jong Hyuk and Kim, Jongsung and Zou, Deqing and Lee, Yang Sun},
ee = {https://doi.org/10.1007/978-94-007-5083-8_28},
interhash = {128d4d8b3e5b9903e9d9b557eb6947a2},
intrahash = {2de287d6e7ee8bf5305281c6576cd23c},
isbn = {978-94-007-5082-1},
keywords = {dblp},
pages = {225-231},
publisher = {Springer},
series = {Lecture Notes in Electrical Engineering},
timestamp = {2019-11-29T11:47:16.000+0100},
title = {Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity.},
url = {http://dblp.uni-trier.de/db/conf/itcs2/itcs2012.html#JeonKLW12},
volume = 180,
year = 2012
}