In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.
本文分析了IMS认证与密钥分配协议的过程,找出了认证协议中的安全缺陷,并给出了攻击者可能进行的攻击。
In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.
本文分析了IMS认证与密钥分配协议的过程,找出了认证协议中的安全缺陷,并给出了攻击者可能进行的攻击。
应用推荐