메뉴 건너뛰기




Volumn E87-B, Issue 5, 2004, Pages 1382-1385

Two Factor Authenticated Key Exchange (TAKE) protocol in public wireless LANs

Author keywords

802.11i; Authentication; EAP method; Key management; Wireless security

Indexed keywords

DATA PRIVACY; LOCAL AREA NETWORKS; PERSONAL DIGITAL ASSISTANTS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 2642546539     PISSN: 09168516     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (24)

References (13)
  • 1
    • 0003593249 scopus 로고    scopus 로고
    • Standard for local and metropolitan area networks-port based network access control
    • June
    • IEEE, "Standard for local and metropolitan area networks-Port based network access control," IEEE Std 802. 1x, June 2001.
    • (2001) IEEE Std 802. 1x
  • 2
    • 0003218499 scopus 로고    scopus 로고
    • PPP extensible authentication protocol (EAP)
    • March
    • L. Blunk and J. Vollbrecht, "PPP extensible authentication protocol (EAP)," RFC 2284, March 1998.
    • (1998) RFC , vol.2284
    • Blunk, L.1    Vollbrecht, J.2
  • 3
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • Oct.
    • D.P. Jablon, "Strong password-only authenticated key exchange," ACM Comput. Commun. Rev., vol.26, no.5, pp.5-26, Oct. 1996.
    • (1996) ACM Comput. Commun. Rev. , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.P.1
  • 6
    • 0003218526 scopus 로고    scopus 로고
    • Remote authentication dial-in user service (RADIUS)
    • June
    • C. Rigney, "Remote authentication dial-in user service (RADIUS)," IETF RFC 2865, June 2000.
    • (2000) IETF RFC , vol.2865
    • Rigney, C.1
  • 7
    • 0003330131 scopus 로고    scopus 로고
    • The network access identifier
    • Jan.
    • B. Aboba and M. Beadles, "The network access identifier," IETF RFC 2486, Jan. 1999.
    • (1999) IETF RFC , vol.2486
    • Aboba, B.1    Beadles, M.2
  • 8
    • 84946838086 scopus 로고    scopus 로고
    • Efficient and mutually authenticated key exchange for low power computing devices
    • ASIACRYPT 2001, Springer-Verlag, Berlin
    • D.S. Wong and A.H. Chan, "Efficient and mutually authenticated key exchange for low power computing devices," in ASIACRYPT 2001, LNCS 2248, Springer-Verlag, Berlin, 2001.
    • (2001) LNCS , vol.2248
    • Wong, D.S.1    Chan, A.H.2
  • 9
    • 0027741529 scopus 로고    scopus 로고
    • Augmented encrypted key exchange: A password-based protocol that is secure against dictionary attacks and password file compromise
    • S. Bellovin and M. Merritt, "Augmented encrypted key exchange: A password-based protocol that is secure against dictionary attacks and password file compromise," ACM Conference on Computer and Communications Security 1993, pp.244-250.
    • ACM Conference on Computer and Communications Security 1993 , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 12
    • 2642549561 scopus 로고    scopus 로고
    • WLAN security - Status, problems and perspective
    • Florence Italy, Feb.
    • M. Casole, "WLAN security - Status, problems and perspective," Proc. European Wireless 2002, Florence Italy, Feb. 2002.
    • (2002) Proc. European Wireless 2002
    • Casole, M.1
  • 13
    • 0027741529 scopus 로고    scopus 로고
    • Augmented encrypted key exchange: A password based protocol secure against dictionary attacks and password file compromise
    • ACM
    • S. Bellovin and M. Merritt, "Augmented encrypted key exchange: A password based protocol secure against dictionary attacks and password file compromise," Proc. 1st Annual Conference on Computer and Communications Security, ACM, 1993.
    • (1993) Proc. 1st Annual Conference on Computer and Communications Security
    • Bellovin, S.1    Merritt, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.