-
1
-
-
24944571295
-
-
http://grouper.ieee.org/groups/802/11/index.html
-
-
-
-
2
-
-
0003580691
-
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
LAN MAN Standards Committee of the IEEE Computer Society, "Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications", IEEE Std 802.11, 1999 Edition, 1999.
-
(1999)
IEEE Std 802.11, 1999 Edition
-
-
-
6
-
-
0003218499
-
PPP Extensible Authentication Protocol (EAP)
-
March
-
IETF (Internet Engineering Task Force), "PPP Extensible Authentication Protocol (EAP)", RFC 2284, March 1998.
-
(1998)
RFC
, vol.2284
-
-
-
7
-
-
0004161128
-
Challenge handshake authentication protocol
-
August
-
IETF (Internet Engineering Task Force), "Challenge Handshake Authentication Protocol", RFC 1994, August 1996.
-
(1996)
RFC
, vol.1994
-
-
-
9
-
-
0038065851
-
PPP EAP TLS authentication protocol
-
October
-
IETF (Internet Engineering Task Force), "PPP EAP TLS Authentication Protocol", RFC 2716, October 1999.
-
(1999)
RFC
, vol.2716
-
-
-
11
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictioinary attacks
-
S. M. Bellovin and M. Merritt, "Encrypted Key Exchange: Password-based Protocols Secure against Dictioinary Attacks", In Proc. of IEEE Symposium on Security and Privacy, pages 72-84, 1992.
-
(1992)
Proc. of IEEE Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
14
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New Directions in Cryptography", In IEEE Transactions on Information Theory, Vol. IT-22(6), pages 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
15
-
-
0018545449
-
How to share a secret
-
A. Shamir. "How to Share a Secret", In Proc. of Communications of the ACM, Vol. 22(11), pages 612-613, 1979.
-
(1979)
Proc. of Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
M. Naor and M. Yung, "Universal One-Way Hash Functions and Their Cryptographic Applications", In Proc. of STOC '89, pages 33-43, 1989.
-
(1989)
Proc. of STOC '89
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
17
-
-
24944459236
-
-
The formal security proof will appear in the Journal of IEICE.
-
Journal of IEICE
-
-
-
19
-
-
0004192381
-
Simultaneous multiple exponentiation
-
CRC Press
-
A. J. Menezes, P. C. Oorschot and S. A. Vanstone, "Simultaneous Multiple Exponentiation", In Handbook of Applied Cryptography, pages 617-619, CRC Press, 1997.
-
(1997)
Handbook of Applied Cryptography
, pp. 617-619
-
-
Menezes, A.J.1
Oorschot, P.C.2
Vanstone, S.A.3
|