-
1
-
-
0003218499
-
PPP Extensible Authentication Protocol (EAP)
-
Mar.
-
L. Blunk and J. Volbrecht, "PPP Extensible Authentication Protocol (EAP)," IETF RFC 2284, Mar. 1998.
-
(1998)
IETF RFC
, vol.2284
-
-
Blunk, L.1
Volbrecht, J.2
-
2
-
-
0003218526
-
Remote Authentication Dial in User Service (RADIUS)
-
June
-
C. Rigney et al., "Remote Authentication Dial In User Service (RADIUS)," IETF RFC 2865, June 2000.
-
(2000)
IETF RFC
, vol.2865
-
-
Rigney, C.1
-
3
-
-
0038065851
-
PPP EAP TLS Authentication Protocol
-
Oct
-
B. Aboba and D. Simon, "PPP EAP TLS Authentication Protocol," IETF RFC 2716, Oct, 1999.
-
(1999)
IETF RFC
, vol.2716
-
-
Aboba, B.1
Simon, D.2
-
4
-
-
0028397595
-
Authentication of Mobile Users
-
R. Molva, D. Samfat, and G. Tsudik, "Authentication of Mobile Users," IEEE Network, vol. 8, no. 2, 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.2
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
5
-
-
0242508596
-
EAP SIM Authentication
-
IETF, June, draft-haverinen- pppext-eap-sim-11.txt; for the latest version
-
H. Haverinen, Ed., "EAP SIM Authentication," Internet draft, IETF, June 2003, draft-haverinen- pppext-eap-sim-11.txt; for the latest version, see http://www.ietf.org
-
(2003)
Internet Draft
-
-
Haverinen, H.1
-
6
-
-
0242508595
-
EAP AKA Authentication
-
IETF, June, draft-arkko-pppext-eap-aka-09.txt; for the latest version
-
J. Arkko and H. Haverinen, "EAP AKA Authentication," Internet draft, IETF, June 2003, draft-arkko-pppext-eap-aka-09.txt; for the latest version see http://www.ietf.org
-
(2003)
Internet Draft
-
-
Arkko, J.1
Haverinen, H.2
-
7
-
-
1642379048
-
EAP Tunneled TLS Authentication Protocol (EAP-TTLS)
-
IETF, Nov.; draft-ietf-pppexteap-ttls-02.txt; for the latest version
-
P. Funk and S. Blake-Wilson, "EAP Tunneled TLS Authentication Protocol (EAP-TTLS)," Internet draft, IETF, Nov. 2002; draft-ietf-pppexteap-ttls-02.txt; for the latest version see http://www.ietf.org
-
(2002)
Internet Draft
-
-
Funk, P.1
Blake-Wilson, S.2
-
8
-
-
0031642585
-
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
-
M. Bellare, R. Canetti, and H. Krawczyk, "A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols," STOC '98, 1998, pp. 419-28.
-
(1998)
STOC '98
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
9
-
-
84945119254
-
Entity Authentication and Key Distribution
-
22-26 Aug.
-
M. Bellare and P. Rogaway, "Entity Authentication and Key Distribution," Advances in Cryptology- CRYPTO '93, LNCS, vol. 773, 22-26 Aug. 1993, pp. 232-49.
-
(1993)
Advances in Cryptology- CRYPTO '93, LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
11
-
-
84888265649
-
PPP EAP SRP-SHA1 Authentication Protocol
-
IETF, July, draft-ietf-pppext-eapsrp-03.txt; for the latest version
-
J. Carlson, B. Aboba, and H. Haverinen, "PPP EAP SRP-SHA1 Authentication Protocol," Internet draft, IETF, July 2001, draft-ietf-pppext-eapsrp-03.txt; for the latest version see http://www.ietf.org
-
(2001)
Internet Draft
-
-
Carlson, J.1
Aboba, B.2
Haverinen, H.3
-
12
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
R. Needham and M. Schroeder, "Using Encryption for Authentication in Large Networks of Computers," Commun. ACM, vol. 21, 1978, pp. 993-99.
-
(1978)
Commun. ACM
, vol.21
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
13
-
-
0027617333
-
Systematic Design of a Family of Attack-resistant Authentication Protocols
-
Special Issue on Secure Communications
-
R. Bird et al., "Systematic Design of a Family of Attack-resistant Authentication Protocols," IEEE JSAC, Special Issue on Secure Communications, vol. 11, no. 5, 1993, pp. 679-93.
-
(1993)
IEEE JSAC
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
-
14
-
-
0031701524
-
A Security Architecture for the Internet Protocol
-
P. Cheng et al., "A Security Architecture for the Internet Protocol," IBM Sys. J., Special Issue on the Internet, vol. 37, no. 1, 1998, pp. 42-60.
-
(1998)
IBM Sys. J., Special Issue on the Internet
, vol.37
, Issue.1
, pp. 42-60
-
-
Cheng, P.1
-
16
-
-
0003272021
-
The Internet Key Exchange (IKE)
-
Nov.
-
D. Harkins and D. Carrel, "The Internet Key Exchange (IKE)," IETF RFC 2409, Nov. 1998.
-
(1998)
IETF RFC
, vol.2409
-
-
Harkins, D.1
Carrel, D.2
-
17
-
-
0003196107
-
HMAC: Keyed-Hashing for Message Authentication
-
Feb.
-
H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication," IETF RFC 2104, Feb. 1997.
-
(1997)
IETF RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
18
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser, and Silvio Micali, "How to Construct Random Functions," J. ACM, vol. 33, no. 169, 1986, pp. 210-17.
-
(1986)
J. ACM
, vol.33
, Issue.169
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
19
-
-
1342340982
-
A Scheme for Authentication and Dynamic Key Exchange in Wireless Networks
-
U. Blumenthal et al., "A Scheme for Authentication and Dynamic Key Exchange in Wireless Networks," Bell Labs Tech. J., vol. 7, no. 2, 2002, pp. 37-48.
-
(2002)
Bell Labs Tech. J.
, vol.7
, Issue.2
, pp. 37-48
-
-
Blumenthal, U.1
-
21
-
-
0003310447
-
IP Mobility Support for IPv4
-
Aug.
-
C. Perkins, Ed., "IP Mobility Support for IPv4," IETF RFC 3344, Aug. 2002.
-
(2002)
IETF RFC
, vol.3344
-
-
Perkins, C.1
|