protocol of UMTS
An extended authentication and key agreement protocol of UMTS
FREE-DOWNLOAD [PDF] F Farhat, S Salimi… – Information Security Practice and …, 2009 –
Abstract. Identification, authentication and key agreement protocol of UMTS networks have some
weaknesses to provide DoS-attack resistance, mutual freshness, and efficient bandwidth
consumption. In this article we consider UMTS AKA and some other proposed schemes.