메뉴 건너뛰기




Volumn 2, Issue , 2005, Pages 1180-1186

Authenticated key exchange for wireless security

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK PROTOCOLS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 24944506121     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (19)
  • 1
    • 24944571295 scopus 로고    scopus 로고
    • http://grouper.ieee.org/groups/802/11/index.html
  • 2
    • 0003580691 scopus 로고    scopus 로고
    • Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
    • LAN MAN Standards Committee of the IEEE Computer Society, "Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications", IEEE Std 802.11, 1999 Edition, 1999.
    • (1999) IEEE Std 802.11, 1999 Edition
  • 6
    • 0003218499 scopus 로고    scopus 로고
    • PPP Extensible Authentication Protocol (EAP)
    • March
    • IETF (Internet Engineering Task Force), "PPP Extensible Authentication Protocol (EAP)", RFC 2284, March 1998.
    • (1998) RFC , vol.2284
  • 7
    • 0004161128 scopus 로고    scopus 로고
    • Challenge handshake authentication protocol
    • August
    • IETF (Internet Engineering Task Force), "Challenge Handshake Authentication Protocol", RFC 1994, August 1996.
    • (1996) RFC , vol.1994
  • 9
    • 0038065851 scopus 로고    scopus 로고
    • PPP EAP TLS authentication protocol
    • October
    • IETF (Internet Engineering Task Force), "PPP EAP TLS Authentication Protocol", RFC 2716, October 1999.
    • (1999) RFC , vol.2716
  • 11
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictioinary attacks
    • S. M. Bellovin and M. Merritt, "Encrypted Key Exchange: Password-based Protocols Secure against Dictioinary Attacks", In Proc. of IEEE Symposium on Security and Privacy, pages 72-84, 1992.
    • (1992) Proc. of IEEE Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. "How to Share a Secret", In Proc. of Communications of the ACM, Vol. 22(11), pages 612-613, 1979.
    • (1979) Proc. of Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 16
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • M. Naor and M. Yung, "Universal One-Way Hash Functions and Their Cryptographic Applications", In Proc. of STOC '89, pages 33-43, 1989.
    • (1989) Proc. of STOC '89 , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 17
    • 24944459236 scopus 로고    scopus 로고
    • The formal security proof will appear in the Journal of IEICE.
    • Journal of IEICE


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.