메뉴 건너뛰기




Volumn 3, Issue , 2005, Pages 1521-1526

DoS-resistant access control protocol with identity confidentiality for wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

DOS-RESISTANT ACCESS CONTROL PROTOCOL; IEEE 802.1X; PUBLIC KEY CRYPTOSYSTEMS (PKC); WIRED NETWORKS;

EID: 24944496397     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNC.2005.1424740     Document Type: Conference Paper
Times cited : (11)

References (21)
  • 2
    • 24944475653 scopus 로고    scopus 로고
    • Just fast keying (JFK)
    • draft-ietf-ipsec-jfk-04.txt. July
    • W. Aliello et al., "Just fast keying (JFK)," IETF Draft(work in progress), draft-ietf-ipsec-jfk-04.txt. July 2002.
    • (2002) IETF Draft(work in Progress)
    • Aliello, W.1
  • 4
    • 0010254788 scopus 로고    scopus 로고
    • Fast implementations of AES candidates
    • New York City, USA, April
    • K. Aoki and H. Lipmaa, "Fast implementations of AES candidates," Third AES Candidate Conference, New York City, USA, April 2000.
    • (2000) Third AES Candidate Conference
    • Aoki, K.1    Lipmaa, H.2
  • 6
    • 0028272762 scopus 로고
    • Privacy and authentication for wireless local area networks
    • A. Aziz and W. Diffie, "Privacy and authentication for wireless local area networks," IEEE Personal Communications, vol. 1, pp. 25-31, 1994.
    • (1994) IEEE Personal Communications , vol.1 , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 8
    • 0027589399 scopus 로고
    • Fully-fledged two-way public key authentication and key agreement for low-cost terminals
    • May
    • M. J. Beller and Y. Yacobi, "Fully-fledged two-way public key authentication and key agreement for low-cost terminals," Electronics Letters, 29, pp. 999-1001, May 1993.
    • (1993) Electronics Letters , vol.29 , pp. 999-1001
    • Beller, M.J.1    Yacobi, Y.2
  • 10
    • 0034777649 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11
    • July 16-21
    • N. Borisov, I. Goldberg, and D. Wagner, "Intercepting mobile communications: the insecurity of 802.11," in Proceedings of MOBICOM 2001, July 16-21, 2001.
    • (2001) Proceedings of MOBICOM 2001
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 14
    • 0036505541 scopus 로고    scopus 로고
    • Authentication protocols for mobile network environment value-added services
    • G. Horn, K. M. Martin, and C. J. Mitchell, "Authentication protocols for mobile network environment value-added services," IEEE Transactions on Vehicular Technology, 51:383-392, 2002.
    • (2002) IEEE Transactions on Vehicular Technology , vol.51 , pp. 383-392
    • Horn, G.1    Martin, K.M.2    Mitchell, C.J.3
  • 15
    • 0004601832 scopus 로고    scopus 로고
    • Photuris: Session-key management protocol
    • P. Karn and W. Simpson, "Photuris: session-key management protocol," IETF RFC 2522, 1999.
    • (1999) IETF RFC , vol.2522
    • Karn, P.1    Simpson, W.2
  • 16
    • 24944435496 scopus 로고    scopus 로고
    • Internet key exchange (IKEv2) protocol
    • draft-ieft-ipsec-ikev2-14.txt, June
    • C. Kaufman, "Internet key exchange (IKEv2) protocol," IETF Draft (work in progress), draft-ieft-ipsec-ikev2-14.txt, June 2004.
    • (2004) IETF Draft (Work in Progress)
    • Kaufman, C.1
  • 18
    • 0013046241 scopus 로고    scopus 로고
    • An initial security analysis of the IEEE 802.1X standard
    • University of Maryland, Febrary
    • A. Mishra and W. A. Arbaugh, "An initial security analysis of the IEEE 802.1X standard," Technical Report CS-TR-4328, University of Maryland, Febrary 2002.
    • (2002) Technical Report , vol.CS-TR-4328
    • Mishra, A.1    Arbaugh, W.A.2
  • 19
    • 0003544555 scopus 로고    scopus 로고
    • Standard for port based network access control
    • IEEE Computer Society, March
    • IEEE Standards Committee, "Standard for port based network access control," Technical Report Draft P802.1X/D11, IEEE Computer Society, March 2001.
    • (2001) Technical Report Draft P802.1X/D11
  • 20
    • 24944460288 scopus 로고    scopus 로고
    • Performance of optimized implementations of the NESSIE primitives
    • Delivrable D12. February
    • B. Preneel et al., "Performance of optimized implementations of the NESSIE primitives," NESSIE Report, Delivrable D12. February 2003.
    • (2003) NESSIE Report
    • Preneel, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.