Skip to main content
placeholder image

Delegating authentication power in mobile networks

Chapter


Abstract


UOW Authors


  •   Huang, Xinyi (external author)
  •   Susilo, Willy
  •   Mu, Yi (external author)
  •   Wu, Wei (external author)

Publication Date


  • 2009

Citation


  • Huang, X., Susilo, W., Mu, Y. & Wu, W. (2009). Delegating authentication power in mobile networks. In S. Gritzalis, T. Karygiannis & C. Skianis (Eds.), Security and privacy in mobile and wireless computing (pp. 217-234). Troubador Publishing Ltd: Leicester, UK.

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3273

Book Title


  • Security and privacy in mobile and wireless computing

Start Page


  • 217

End Page


  • 234

Abstract


UOW Authors


  •   Huang, Xinyi (external author)
  •   Susilo, Willy
  •   Mu, Yi (external author)
  •   Wu, Wei (external author)

Publication Date


  • 2009

Citation


  • Huang, X., Susilo, W., Mu, Y. & Wu, W. (2009). Delegating authentication power in mobile networks. In S. Gritzalis, T. Karygiannis & C. Skianis (Eds.), Security and privacy in mobile and wireless computing (pp. 217-234). Troubador Publishing Ltd: Leicester, UK.

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3273

Book Title


  • Security and privacy in mobile and wireless computing

Start Page


  • 217

End Page


  • 234