메뉴 건너뛰기




Volumn 4, Issue , 2004, Pages 2229-2234

Attacks and solutions on Aydos-Savas-Ko̧c's wireless authentication protocol

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; BANDWIDTH; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; SECURITY OF DATA; SERVERS; SET THEORY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 18144366934     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (15)
  • 5
    • 84945247158 scopus 로고    scopus 로고
    • Password authenticated key exchange based on RSA for unbalanced wireless networks
    • Lecture Notes on Computer Science
    • F. Zhu, D. S. Wong, A. H. Chan, and R Ye, "Password authenticated key exchange based on RSA for unbalanced wireless networks", Proceedings of the 5th International Conference on Information Security, Lecture Notes on Computer Science, vol. 2433, pp. 150-161, 2002.
    • (2002) Proceedings of the 5th International Conference on Information Security , vol.2433 , pp. 150-161
    • Zhu, F.1    Wong, D.S.2    Chan, A.H.3    Ye, R.4
  • 7
    • 0028272762 scopus 로고
    • A secure communications protocol to prevent unauthorized access, privacy and authentication for wireless local area networks
    • A. Aziz and W. Diffie, "A secure communications protocol to prevent unauthorized access, privacy and authentication for wireless local area networks", IEEE Personal Communications, vol. 1, no. 1, pp. 25-31, 1994.
    • (1994) IEEE Personal Communications , vol.1 , Issue.1 , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 9
    • 0035482595 scopus 로고    scopus 로고
    • High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor
    • October
    • M. Aydos, T. Yanik, and C. K. Koc, "High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor", IEEE Proceedings on Communications, vol. 148 no. 5, pp. 273-279, October 2001.
    • (2001) IEEE Proceedings on Communications , vol.148 , Issue.5 , pp. 273-279
    • Aydos, M.1    Yanik, T.2    Koc, C.K.3
  • 13
    • 0742325040 scopus 로고    scopus 로고
    • Analysis of the SPEKE password-authenticated key exchange protocol
    • January
    • M. Zhang, "Analysis of the SPEKE password-authenticated key exchange protocol", IEEE Communications Letters, vol 8, no.l, pp 63-65, January 2004.
    • (2004) IEEE Communications Letters , vol.8 , Issue.50 , pp. 63-65
    • Zhang, M.1
  • 14
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • October
    • D. Jablon, "Strong password-only authenticated key exchange", Comput. Commun. Rev., ACM SIGCOMM, vol 26, pp. 5-26, October 1996.
    • (1996) Comput. Commun. Rev., ACM SIGCOMM , vol.26 , pp. 5-26
    • Jablon, D.1
  • 15
    • 0037942544 scopus 로고    scopus 로고
    • Cryptanalysis of mutual authentication and key exchange for low power wireless communications
    • May
    • K. Shim, "Cryptanalysis of mutual authentication and key exchange for low power wireless communications", IEEE Communications Letters, vol. 7, no. 5, pp 248-250, May 2003.
    • (2003) IEEE Communications Letters , vol.7 , Issue.5 , pp. 248-250
    • Shim, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.