@inproceedings{a4d7c7bb727947f6b72235c8794a3c78,
title = "Analysis and modification of ASK mobile security protocol",
abstract = "Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack.",
author = "Kim, {Il Gon} and Kim, {Hyun Seok} and Lee, {Ji Yeon} and Choi, {Jin Young}",
note = "Copyright: Copyright 2008 Elsevier B.V., All rights reserved.",
year = "2005",
doi = "10.1109/WMCS.2005.4",
language = "English",
isbn = "0769523919",
series = "Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05",
pages = "79--83",
booktitle = "Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05",
}