메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 376-382

Protecting the infrastructure: Evaluating a model for secured network connectivity using identity and authentication for use in a mobile computing environment

Author keywords

Biometrics; Mobile computing; Secured authentication

Indexed keywords

BIOMETRICS; INFRASTRUCTURE; SACRED AUTHENTICATION; WI-FI;

EID: 12844275139     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (21)
  • 3
    • 12844271596 scopus 로고    scopus 로고
    • A good defense: Safeguarding the network from within
    • 1st Quarter
    • F. Gambino (2003, 1st Quarter). A good defense: safeguarding the network from within. Packet, 15 (1), 23-27.
    • (2003) Packet , vol.15 , Issue.1 , pp. 23-27
    • Gambino, F.1
  • 5
    • 1642363165 scopus 로고    scopus 로고
    • A framework for choosing your next generation authentication /authorization system
    • 2002
    • M.D. Guel (2002). A Framework for Choosing Your Next Generation Authentication /Authorization System. Information Security Technical Report, 7 (1), 2002, 63-78.
    • (2002) Information Security Technical Report , vol.7 , Issue.1 , pp. 63-78
    • Guel, M.D.1
  • 6
    • 9744283239 scopus 로고    scopus 로고
    • Sebastopol, CA: O'Reilly & Associates
    • B. Porter & B. Fleck (2003). 802.11 Security. Sebastopol, CA: O'Reilly & Associates.
    • (2003) 802.11 Security
    • Porter, B.1    Fleck, B.2
  • 8
    • 12844287614 scopus 로고    scopus 로고
    • Wireless takes off
    • Third Quarter
    • J. Wexler, (2003, Third Quarter). Wireless takes off. Packet, 15 (3), 30-33.
    • (2003) Packet , vol.15 , Issue.3 , pp. 30-33
    • Wexler, J.1
  • 10
    • 0032164492 scopus 로고    scopus 로고
    • Security for virtual private intranets
    • September
    • W. A. Arbaugh, J. R. Davin, D. J. Farber, & J. M. Smith, (1998, September). Security for virtual private intranets. IEEE Computer, 32 (9), 48-55.
    • (1998) IEEE Computer , vol.32 , Issue.9 , pp. 48-55
    • Arbaugh, W.A.1    Davin, J.R.2    Farber, D.J.3    Smith, J.M.4
  • 11
    • 0032676481 scopus 로고    scopus 로고
    • Enhanced privacy and authentication for the global system for mobile communications
    • C. Lee, M. Hwang & W. Yang (1999). Enhanced privacy and authentication for the global system for mobile communications. Wireless Networks 5 (1999) 231-243.
    • (1999) Wireless Networks , vol.5 , Issue.1999 , pp. 231-243
    • Lee, C.1    Hwang, M.2    Yang, W.3
  • 12
    • 0033879165 scopus 로고    scopus 로고
    • Biometrics: The future of identification
    • February 2000
    • S. Pankanti, R. M. Bolle, & A. Jain, (2000,). Biometrics: The future of identification. IEEE Computer, February 2000, 46-49.
    • (2000) IEEE Computer , pp. 46-49
    • Pankanti, S.1    Bolle, R.M.2    Jain, A.3
  • 15
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks. a USC/ISI technical report number ISI/RS-94-399
    • B. C. Neuman & T. Tso, (1994). Kerberos: An authentication service for computer networks. A USC/ISI Technical Report number ISI/RS-94-399. IEEE Communications, 32 (9), 33-38.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Tso, T.2
  • 17
    • 12844277408 scopus 로고    scopus 로고
    • A methodology for analyzing the performance of authentication protocols
    • November
    • A. Harbitter & D. Menascé (2002, November). A methodology for analyzing the performance of authentication protocols. ACM Transactions on Information and System Security, 5 (4), 458-491.
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.4 , pp. 458-491
    • Harbitter, A.1    Menascé, D.2
  • 19
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December 1978
    • R. M. Needham & M. D. Schroeder (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21 (12) December 1978, 992-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 992-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 20
    • 0542400928 scopus 로고    scopus 로고
    • Techniques for authentication protocols and key distribution on wireless ATM networks
    • D. Patiyoot & J. Shepherd (1998). Techniques for authentication protocols and key distribution on wireless ATM networks. In Proceedings of ACM SIGOPS '98 - Operating Systems Review 32 (4), 25-32.
    • (1998) Proceedings of ACM SIGOPS '98 - Operating Systems Review , vol.32 , Issue.4 , pp. 25-32
    • Patiyoot, D.1    Shepherd, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.