메뉴 건너뛰기




Volumn 10, Issue 6, 2003, Pages 52-61

Efficient Authentication and Key Distribution in Wireless IP Networks

Author keywords

[No Author keywords available]

Indexed keywords

WIRED ENCRYPTION PRIVACY (WEP); WIRELESS INTERNET SERVICE PROVIDERS; WIRELESS SHARED KEY EXCHANGE (WKE);

EID: 1342282538     PISSN: 15361284     EISSN: None     Source Type: Journal    
DOI: 10.1109/MWC.2003.1265853     Document Type: Article
Times cited : (66)

References (21)
  • 1
    • 0003218499 scopus 로고    scopus 로고
    • PPP Extensible Authentication Protocol (EAP)
    • Mar.
    • L. Blunk and J. Volbrecht, "PPP Extensible Authentication Protocol (EAP)," IETF RFC 2284, Mar. 1998.
    • (1998) IETF RFC , vol.2284
    • Blunk, L.1    Volbrecht, J.2
  • 2
    • 0003218526 scopus 로고    scopus 로고
    • Remote Authentication Dial in User Service (RADIUS)
    • June
    • C. Rigney et al., "Remote Authentication Dial In User Service (RADIUS)," IETF RFC 2865, June 2000.
    • (2000) IETF RFC , vol.2865
    • Rigney, C.1
  • 3
    • 0038065851 scopus 로고    scopus 로고
    • PPP EAP TLS Authentication Protocol
    • Oct
    • B. Aboba and D. Simon, "PPP EAP TLS Authentication Protocol," IETF RFC 2716, Oct, 1999.
    • (1999) IETF RFC , vol.2716
    • Aboba, B.1    Simon, D.2
  • 4
    • 0028397595 scopus 로고
    • Authentication of Mobile Users
    • R. Molva, D. Samfat, and G. Tsudik, "Authentication of Mobile Users," IEEE Network, vol. 8, no. 2, 1994.
    • (1994) IEEE Network , vol.8 , Issue.2
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 5
    • 0242508596 scopus 로고    scopus 로고
    • EAP SIM Authentication
    • IETF, June, draft-haverinen- pppext-eap-sim-11.txt; for the latest version
    • H. Haverinen, Ed., "EAP SIM Authentication," Internet draft, IETF, June 2003, draft-haverinen- pppext-eap-sim-11.txt; for the latest version, see http://www.ietf.org
    • (2003) Internet Draft
    • Haverinen, H.1
  • 6
    • 0242508595 scopus 로고    scopus 로고
    • EAP AKA Authentication
    • IETF, June, draft-arkko-pppext-eap-aka-09.txt; for the latest version
    • J. Arkko and H. Haverinen, "EAP AKA Authentication," Internet draft, IETF, June 2003, draft-arkko-pppext-eap-aka-09.txt; for the latest version see http://www.ietf.org
    • (2003) Internet Draft
    • Arkko, J.1    Haverinen, H.2
  • 7
    • 1642379048 scopus 로고    scopus 로고
    • EAP Tunneled TLS Authentication Protocol (EAP-TTLS)
    • IETF, Nov.; draft-ietf-pppexteap-ttls-02.txt; for the latest version
    • P. Funk and S. Blake-Wilson, "EAP Tunneled TLS Authentication Protocol (EAP-TTLS)," Internet draft, IETF, Nov. 2002; draft-ietf-pppexteap-ttls-02.txt; for the latest version see http://www.ietf.org
    • (2002) Internet Draft
    • Funk, P.1    Blake-Wilson, S.2
  • 8
    • 0031642585 scopus 로고    scopus 로고
    • A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
    • M. Bellare, R. Canetti, and H. Krawczyk, "A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols," STOC '98, 1998, pp. 419-28.
    • (1998) STOC '98 , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 9
  • 11
    • 84888265649 scopus 로고    scopus 로고
    • PPP EAP SRP-SHA1 Authentication Protocol
    • IETF, July, draft-ietf-pppext-eapsrp-03.txt; for the latest version
    • J. Carlson, B. Aboba, and H. Haverinen, "PPP EAP SRP-SHA1 Authentication Protocol," Internet draft, IETF, July 2001, draft-ietf-pppext-eapsrp-03.txt; for the latest version see http://www.ietf.org
    • (2001) Internet Draft
    • Carlson, J.1    Aboba, B.2    Haverinen, H.3
  • 12
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • R. Needham and M. Schroeder, "Using Encryption for Authentication in Large Networks of Computers," Commun. ACM, vol. 21, 1978, pp. 993-99.
    • (1978) Commun. ACM , vol.21 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 13
    • 0027617333 scopus 로고
    • Systematic Design of a Family of Attack-resistant Authentication Protocols
    • Special Issue on Secure Communications
    • R. Bird et al., "Systematic Design of a Family of Attack-resistant Authentication Protocols," IEEE JSAC, Special Issue on Secure Communications, vol. 11, no. 5, 1993, pp. 679-93.
    • (1993) IEEE JSAC , vol.11 , Issue.5 , pp. 679-693
    • Bird, R.1
  • 14
    • 0031701524 scopus 로고    scopus 로고
    • A Security Architecture for the Internet Protocol
    • P. Cheng et al., "A Security Architecture for the Internet Protocol," IBM Sys. J., Special Issue on the Internet, vol. 37, no. 1, 1998, pp. 42-60.
    • (1998) IBM Sys. J., Special Issue on the Internet , vol.37 , Issue.1 , pp. 42-60
    • Cheng, P.1
  • 16
    • 0003272021 scopus 로고    scopus 로고
    • The Internet Key Exchange (IKE)
    • Nov.
    • D. Harkins and D. Carrel, "The Internet Key Exchange (IKE)," IETF RFC 2409, Nov. 1998.
    • (1998) IETF RFC , vol.2409
    • Harkins, D.1    Carrel, D.2
  • 17
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-Hashing for Message Authentication
    • Feb.
    • H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication," IETF RFC 2104, Feb. 1997.
    • (1997) IETF RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 18
    • 0022793132 scopus 로고
    • How to Construct Random Functions
    • O. Goldreich, S. Goldwasser, and Silvio Micali, "How to Construct Random Functions," J. ACM, vol. 33, no. 169, 1986, pp. 210-17.
    • (1986) J. ACM , vol.33 , Issue.169 , pp. 210-217
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 19
    • 1342340982 scopus 로고    scopus 로고
    • A Scheme for Authentication and Dynamic Key Exchange in Wireless Networks
    • U. Blumenthal et al., "A Scheme for Authentication and Dynamic Key Exchange in Wireless Networks," Bell Labs Tech. J., vol. 7, no. 2, 2002, pp. 37-48.
    • (2002) Bell Labs Tech. J. , vol.7 , Issue.2 , pp. 37-48
    • Blumenthal, U.1
  • 21
    • 0003310447 scopus 로고    scopus 로고
    • IP Mobility Support for IPv4
    • Aug.
    • C. Perkins, Ed., "IP Mobility Support for IPv4," IETF RFC 3344, Aug. 2002.
    • (2002) IETF RFC , vol.3344
    • Perkins, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.