-
5
-
-
84888323244
-
PPP Extensible Authentication Protocol (EAP)
-
March
-
PPP Extensible Authentication Protocol (EAP), IETF RFC 2284, March 1998.
-
(1998)
IETF RFC
, vol.2284
-
-
-
6
-
-
0003312487
-
Remote Authentication Dial in User Service (RADIUS)
-
April
-
Remote Authentication Dial In User Service (RADIUS), IETF RFC 2138, April 1997.
-
(1997)
IETF RFC
, vol.2138
-
-
-
7
-
-
67249090601
-
SPRiNG: Synchronized random numbers for wireless security
-
March
-
D. L. Pepyne, Yu-Chi Ho, and Q. Zheng, "SPRiNG: Synchronized Random Numbers for Wireless Security," IEEE Wireless Communications and Networking Conf., (WCNC2003), vol. 3, pp. 2027-2032, March 2003.
-
(2003)
IEEE Wireless Communications and Networking Conf., (WCNC2003)
, vol.3
, pp. 2027-2032
-
-
Pepyne, D.L.1
Ho, Y.-C.2
Zheng, Q.3
-
8
-
-
84944878354
-
-
CRC Press Series on Discrete Mathematics and Its Applications, CRC Press
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, CRC Press, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
10
-
-
4143068049
-
Strengthening WEP protocol for wireless networks using block chaining algorithm with variable encryption function mechanism
-
April
-
N. Chandran and D. Sampath, "Strengthening WEP Protocol for Wireless Networks using Block Chaining Algorithm with Variable Encryption Function Mechanism," Advances in Wired and Wireless Communication, pp. 141-143, April 2004.
-
(2004)
Advances in Wired and Wireless Communication
, pp. 141-143
-
-
Chandran, N.1
Sampath, D.2
-
11
-
-
0038065851
-
PPP EAP TLS authentication protocol
-
October
-
PPP EAP TLS Authentication Protocol, IETF RFC 2716, October 1999.
-
(1999)
IETF RFC
, vol.2716
-
-
-
12
-
-
27644566875
-
EAP Tunneled TLS Authentication Protocol (EAP-TTLS)
-
February
-
EAP Tunneled TLS Authentication Protocol (EAP-TTLS), IETF Internet Draft, February 2002.
-
(2002)
IETF Internet Draft
-
-
-
14
-
-
0242508595
-
-
IETF, draft-arkko-pppext-eap-aka-05.txt, October
-
EAP AKA Authentication, IETF, draft-arkko-pppext-eap-aka-05.txt, October 2002.
-
(2002)
EAP AKA Authentication
-
-
-
15
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
February
-
K. Lauter, "The Advantages of Elliptic Curve Cryptography for Wireless Security," IEEE Wireless Communications Magazine, pp. 62-67, vol, 11, no. 1, February 2004.
-
(2004)
IEEE Wireless Communications Magazine
, vol.11
, Issue.1
, pp. 62-67
-
-
Lauter, K.1
-
16
-
-
84944414306
-
Standard specifications for public key cryptography
-
Standard Specifications for Public Key Cryptography, IEEE 1363, 2000.
-
(2000)
IEEE
, vol.1363
-
-
-
17
-
-
0003735739
-
The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
Dept. of C & O, University of Waterloo, Canada, 23 August
-
Don Johnson and Alfred Menezes, "The Elliptic Curve Digital Signature Algorithm (ECDSA)", Technical Report CORR 99-34, Dept. of C & O, University of Waterloo, Canada, 23 August 1999.
-
(1999)
Technical Report
, vol.CORR 99-34
-
-
Johnson, D.1
Menezes, A.2
-
20
-
-
1842665111
-
Proactive key distribution using neighbor graph
-
February
-
A. Mishra, M. H. Shin, N. L. Petroni, Jr. T. Charles Clancy, and W. A. Arbaugh, "Proactive Key Distribution Using Neighbor Graph," IEEE Wireless Communications Magazine, pp 26-36, vol. 11, no. 1, February 2004.
-
(2004)
IEEE Wireless Communications Magazine
, vol.11
, Issue.1
-
-
Mishra, A.1
Shin, M.H.2
Petroni, N.L.3
Clancy Jr., T.C.4
Arbaugh, W.A.5
|