Last update: Sun Oct 15 02:05:00 MDT 2017
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Li:2009:DCP,
author = "Dalton Li and David Lin and Grace Zhao and Brian
Huang",
title = "Design and correctness proof of a security protocol
for mobile banking",
journal = j-BELL-LABS-TECH-J,
volume = "14",
number = "1",
pages = "259--265",
month = "Spring",
year = "2009",
CODEN = "BLTJFD",
DOI = "https://doi.org/10.1002/bltj.20366",
ISSN = "1089-7089 (print), 1538-7305 (electronic)",
ISSN-L = "1089-7089",
bibdate = "Fri Nov 26 17:31:42 MST 2010",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bstj2000.bib",
acknowledgement = ack-nhfb,
fjournal = "Bell Labs Technical Journal",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
onlinedate = "18 May 2009",
}
Related entries
- banking,
12(3)55
- design,
6(1)82,
8(3)3,
9(2)51,
9(3)101,
9(4)5,
10(2)157,
10(3)61,
10(3)87,
10(3)107,
11(2)65,
11(2)129,
11(3)91,
11(4)53,
12(2)97,
13(2)75,
13(4)97,
14(2)5,
14(2)97,
14(3)21
- Huang, Brian,
12(1)123
- Li, Dalton,
12(1)123
- mobile,
5(1)107,
5(3)112,
6(2)47,
6(2)84,
7(2)143,
7(2)185,
8(2)3,
8(4)121,
9(3)217,
10(1)59,
11(3)47,
11(3)191,
11(4)237,
12(1)247,
12(2)79,
13(2)49,
13(2)57,
13(4)7,
13(4)35
- protocol,
5(3)153,
6(2)136,
7(1)3,
7(4)23,
8(1)83,
9(1)83,
9(3)1,
11(1)203,
12(3)79
- security,
6(2)74,
7(2)19,
8(1)113,
8(1)131,
8(4)7,
8(4)39,
8(4)93,
8(4)133,
8(4)187,
8(4)203,
9(2)5,
11(1)37,
11(1)59,
11(3)73,
11(3)191,
11(3)211,
11(4)291,
12(3)1,
12(3)7,
12(3)39,
12(3)65,
12(3)79,
12(3)95,
12(3)101,
12(3)167,
12(3)187,
13(4)245