메뉴 건너뛰기




Volumn 23, Issue 17, 2000, Pages 1627-1637

Key agreement in ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; FAULT TOLERANT COMPUTER SYSTEMS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 0034317075     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0140-3664(00)00249-8     Document Type: Article
Times cited : (267)

References (15)
  • 1
    • 0004115841 scopus 로고    scopus 로고
    • IETF Network working group request for comments, November RFC 2409
    • D. Harkins, D. Carrel, The Internet Key Exchange (IKE). IETF Network working group request for comments, November 1998. RFC 2409.
    • (1998) The Internet Key Exchange (IKE)
    • Harkins, D.1    Carrel, D.2
  • 5
    • 0030648441 scopus 로고    scopus 로고
    • Number theoretic attacks on secure password schemes
    • Research in Security and Privacy, Oakland, CA, IEEE Computer Society Press, Silver Spring, MD, May
    • S. Patel, Number theoretic attacks on secure password schemes. Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, Oakland, CA, IEEE Computer Society Press, Silver Spring, MD, May 1997, pp. 236-247.
    • (1997) Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 236-247
    • Patel, S.1
  • 8
    • 85031540426 scopus 로고    scopus 로고
    • Private communication, Unpublished work described in slides of presentation made at the March
    • M. Steiner, G. Tsudik, M. Waidner. Private communication, Unpublished work described in slides of presentation made at the Third ACM CCS conference, March 1996.
    • (1996) Third ACM CCS Conference
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 10
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: security issues for ad-hoc wireless networks
    • Proceedings of the Seventh International Workshop on Security Protocols, Springer, Berlin Germany, April Available from
    • F. Stajano, R. Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks, Proceedings of the Seventh International Workshop on Security Protocols, Lecture Notes in Computer Science. Springer, Berlin Germany, April 1999. Available from http://www.cl.cam.ac.uk/fms27/duckling/.
    • (1999) Lecture Notes in Computer Science
    • Stajano, F.1    Anderson, R.2
  • 12
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • Ecole Normale Suprieure, Paris, April
    • S. Lucks, Open key exchange: how to defeat dictionary attacks without encrypting public keys. Security Protocol Workshop '97, Ecole Normale Suprieure, Paris, April 1997.
    • (1997) Security Protocol Workshop '97
    • Lucks, S.1
  • 14
    • 85180527787 scopus 로고    scopus 로고
    • The secure remote password protocol
    • San Diego, California, March Internet Society
    • T. Wu, The secure remote password protocol. Symposium on Network and Distributed Systems Security (NDSS '98), San Diego, California, March 1998, pp. 97-111, Internet Society.
    • (1998) Symposium on Network and Distributed Systems Security (NDSS '98) , pp. 97-111
    • Wu, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.