-
2
-
-
24944475653
-
Just fast keying (JFK)
-
draft-ietf-ipsec-jfk-04.txt. July
-
W. Aliello et al., "Just fast keying (JFK)," IETF Draft(work in progress), draft-ietf-ipsec-jfk-04.txt. July 2002.
-
(2002)
IETF Draft(work in Progress)
-
-
Aliello, W.1
-
4
-
-
0010254788
-
Fast implementations of AES candidates
-
New York City, USA, April
-
K. Aoki and H. Lipmaa, "Fast implementations of AES candidates," Third AES Candidate Conference, New York City, USA, April 2000.
-
(2000)
Third AES Candidate Conference
-
-
Aoki, K.1
Lipmaa, H.2
-
6
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
A. Aziz and W. Diffie, "Privacy and authentication for wireless local area networks," IEEE Personal Communications, vol. 1, pp. 25-31, 1994.
-
(1994)
IEEE Personal Communications
, vol.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
7
-
-
0027641891
-
Privacy and authentication on a portable communications system
-
M. J. Beller, L.-F. Chang, and Y. Yacobi, "Privacy and authentication on a portable communications system," IEEE Journal on Selected Areas in Communications, 11:821-829, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, pp. 821-829
-
-
Beller, M.J.1
Chang, L.-F.2
Yacobi, Y.3
-
8
-
-
0027589399
-
Fully-fledged two-way public key authentication and key agreement for low-cost terminals
-
May
-
M. J. Beller and Y. Yacobi, "Fully-fledged two-way public key authentication and key agreement for low-cost terminals," Electronics Letters, 29, pp. 999-1001, May 1993.
-
(1993)
Electronics Letters
, vol.29
, pp. 999-1001
-
-
Beller, M.J.1
Yacobi, Y.2
-
14
-
-
0036505541
-
Authentication protocols for mobile network environment value-added services
-
G. Horn, K. M. Martin, and C. J. Mitchell, "Authentication protocols for mobile network environment value-added services," IEEE Transactions on Vehicular Technology, 51:383-392, 2002.
-
(2002)
IEEE Transactions on Vehicular Technology
, vol.51
, pp. 383-392
-
-
Horn, G.1
Martin, K.M.2
Mitchell, C.J.3
-
15
-
-
0004601832
-
Photuris: Session-key management protocol
-
P. Karn and W. Simpson, "Photuris: session-key management protocol," IETF RFC 2522, 1999.
-
(1999)
IETF RFC
, vol.2522
-
-
Karn, P.1
Simpson, W.2
-
16
-
-
24944435496
-
Internet key exchange (IKEv2) protocol
-
draft-ieft-ipsec-ikev2-14.txt, June
-
C. Kaufman, "Internet key exchange (IKEv2) protocol," IETF Draft (work in progress), draft-ieft-ipsec-ikev2-14.txt, June 2004.
-
(2004)
IETF Draft (Work in Progress)
-
-
Kaufman, C.1
-
18
-
-
0013046241
-
An initial security analysis of the IEEE 802.1X standard
-
University of Maryland, Febrary
-
A. Mishra and W. A. Arbaugh, "An initial security analysis of the IEEE 802.1X standard," Technical Report CS-TR-4328, University of Maryland, Febrary 2002.
-
(2002)
Technical Report
, vol.CS-TR-4328
-
-
Mishra, A.1
Arbaugh, W.A.2
-
19
-
-
0003544555
-
Standard for port based network access control
-
IEEE Computer Society, March
-
IEEE Standards Committee, "Standard for port based network access control," Technical Report Draft P802.1X/D11, IEEE Computer Society, March 2001.
-
(2001)
Technical Report Draft P802.1X/D11
-
-
-
20
-
-
24944460288
-
Performance of optimized implementations of the NESSIE primitives
-
Delivrable D12. February
-
B. Preneel et al., "Performance of optimized implementations of the NESSIE primitives," NESSIE Report, Delivrable D12. February 2003.
-
(2003)
NESSIE Report
-
-
Preneel, B.1
|