-
1
-
-
3042594523
-
-
[Online]
-
"Bluetooth Specification" 2001 [Online]. Available: http://www.bluetooth.org/spec/
-
(2001)
Bluetooth Specification
-
-
-
2
-
-
31344457113
-
-
Wireless IP Network Standard, P.S0001-B v1.0, Third Generation Partnership Project 2 (3GPP2), Oct.
-
3GPP2 Technical Specifications, Wireless IP Network Standard, P.S0001-B v1.0, Third Generation Partnership Project 2 (3GPP2), Oct. 2002.
-
(2002)
3GPP2 Technical Specifications
-
-
-
3
-
-
31344453082
-
General packet radio service (GPRS); service description (stage 2)
-
TS 23.060 v6.4.0, Third Generation Partnership Project, Jan.
-
3GPP2 Technical Specifications, General Packet Radio Service (GPRS); Service description (Stage 2), TS 23.060 v6.4.0, Third Generation Partnership Project, Jan. 2004.
-
(2004)
3GPP2 Technical Specifications
-
-
-
4
-
-
0036817553
-
WLAN-GPRS integration for next-generation mobile data networks
-
Oct.
-
K. Salkintzis et al., "WLAN-GPRS integration for next-generation mobile data networks," IEEE Wireless Commun., vol. 9, no. 5, pp. 112-124, Oct. 2002.
-
(2002)
IEEE Wireless Commun.
, vol.9
, Issue.5
, pp. 112-124
-
-
Salkintzis, K.1
-
5
-
-
0035507288
-
Wireless LAN access network architecture for mobile operators
-
Nov.
-
J. Ala-Laurila, J. Mikkonen, and J. Rinnemaa, "Wireless LAN access network architecture for mobile operators," IEEE Commun. Mag., vol. 39, no. 11, pp. 82-89, Nov. 2001.
-
(2001)
IEEE Commun. Mag.
, vol.39
, Issue.11
, pp. 82-89
-
-
Ala-Laurila, J.1
Mikkonen, J.2
Rinnemaa, J.3
-
6
-
-
0033724468
-
Handoff in hybrid mobile data networks
-
Apr.
-
Pahlavan K. et al., "Handoff in hybrid mobile data networks," IEEE Pers. Commun., vol. 7, no. 2, pp. 34-47, Apr. 2000.
-
(2000)
IEEE Pers. Commun.
, vol.7
, Issue.2
, pp. 34-47
-
-
Pahlavan, K.1
-
7
-
-
0042474493
-
Integration of 802.11 and third generation wireless data networks
-
M. Buddhikot, G. Chandranmenon, S. Han, Y. W. Lee, S. Miller, and L. Salgarelli, "Integration of 802.11 and third generation wireless data networks," in Proc. IEEE INFOCOM 2003 vol. 1, pp. 503-512.
-
Proc. IEEE INFOCOM 2003
, vol.1
, pp. 503-512
-
-
Buddhikot, M.1
Chandranmenon, G.2
Han, S.3
Lee, Y.W.4
Miller, S.5
Salgarelli, L.6
-
8
-
-
0242611879
-
Design and implementation of a WLAN/CDMA2000 Intel-working architecture
-
Nov.
-
M. Buddhikot, G. Chandranmenon, S. Han, Y.-W. Lee, S. Miller, and L. Salgarelli, "Design and implementation of a WLAN/CDMA2000 Intel-working architecture," IEEE Commun. Mag., vol. 41, no. 11, pp. 90-100, Nov. 2003.
-
(2003)
IEEE Commun. Mag.
, vol.41
, Issue.11
, pp. 90-100
-
-
Buddhikot, M.1
Chandranmenon, G.2
Han, S.3
Lee, Y.-W.4
Miller, S.5
Salgarelli, L.6
-
9
-
-
31344438017
-
3GPP system to Wireless Local Area Network (WLAN) interworking; system description
-
TS 23.234, v6.0.0, Third Generation Partnership Project, Apr.
-
3GPP2 Technical Specifications, 3GPP system to Wireless Local Area Network (WLAN) interworking; system description, TS 23.234, v6.0.0, Third Generation Partnership Project, Apr. 2004.
-
(2004)
3GPP2 Technical Specifications
-
-
-
11
-
-
31344479668
-
Digital cellular telecommunications system (Phase 2+); performance requirements on mobile radio interface
-
TS 44.013 v5.0.0, R5, Third Generation Partnership Project, Jun.
-
3GPP Technical Specifications, Digital cellular telecommunications system (Phase 2+); performance requirements on mobile radio interface, TS 44.013 v5.0.0, R5, Third Generation Partnership Project, Jun. 2002.
-
(2002)
3GPP Technical Specifications
-
-
-
12
-
-
1842665111
-
Pro-active key distribution using neighbor graphs
-
Feb.
-
A. Mishra, M. Shin, J. Nick, L. Petroni, T. C. Clancy, and W. A. Arbaugh, "Pro-active key distribution using neighbor graphs," IEEE Wireless Commun., vol. 11, no. 1, pp. 26-36, Feb. 2004.
-
(2004)
IEEE Wireless Commun.
, vol.11
, Issue.1
, pp. 26-36
-
-
Mishra, A.1
Shin, M.2
Nick, J.3
Petroni, L.4
Clancy, T.C.5
Arbaugh, W.A.6
-
13
-
-
84858535867
-
-
[Online]
-
FCC [Online]. Available: http://wireless.fcc.gov/services/cellular/ operations/fraud.html
-
-
-
-
15
-
-
84958598390
-
Cryptanalysis of the cellular message encryption algorithm
-
B. Schneier, J. Kelsey, and D. Wagner, "Cryptanalysis of the cellular message encryption algorithm," in Proc. Crypto'97 pp. 526-537.
-
Proc. Crypto'97
, pp. 526-537
-
-
Schneier, B.1
Kelsey, J.2
Wagner, D.3
-
17
-
-
0010385996
-
-
[Online]
-
L. Pesonen, GSM interception [Online], Available: http://www. dia.unisa.it/professori/ads/corso-security/www/CORSO-9900/ a5%/Netsec/netsec. html
-
GSM Interception
-
-
Pesonen, L.1
-
18
-
-
77955135044
-
Authentication and security in mobile phones
-
Melbourne, Australia.
-
G. Rose, "Authentication and security in mobile phones," presented at the Australian Unix User's Group Conf. (AUUG99), Melbourne, Australia.
-
Australian Unix User's Group Conf. (AUUG99)
-
-
Rose, G.1
-
20
-
-
1642640920
-
-
New York: McGraw-Hill Telecom
-
C. Smith, Ed. et al., 3G Wireless Networks. New York: McGraw-Hill Telecom, 2002.
-
(2002)
3G Wireless Networks
-
-
Smith, C.1
-
21
-
-
31344443231
-
Revenue assurance, fraud and security in 3G telecom services
-
Fall, [Online]
-
M. Johnson, "Revenue assurance, fraud and security in 3G telecom services," J. Econom. Crime Mgmt. vol. 1, no. 2, Fall, 2002 [Online]. Available: http://www.jecm.org/02_fall_art3.pdf
-
(2002)
J. Econom. Crime Mgmt.
, vol.1
, Issue.2
-
-
Johnson, M.1
-
22
-
-
1842815892
-
An introduction to access security in UMTS
-
Feb.
-
G. Koien, "An introduction to access security in UMTS," IEEE Wireless Commun, vol. 11, no. 1, pp. 8-18, Feb. 2004.
-
(2004)
IEEE Wireless Commun
, vol.11
, Issue.1
, pp. 8-18
-
-
Koien, G.1
-
23
-
-
31344460491
-
3G security; security architecture (release 6)
-
3GPP TS 33.102 v6.0.0, Third Generation Partnership Project, Sep.
-
3GPP Technical Specifications, 3G security; security architecture (Release 6), 3GPP TS 33.102 v6.0.0, Third Generation Partnership Project, Sep. 2003.
-
(2003)
3GPP Technical Specifications
-
-
-
24
-
-
31344465327
-
Technical specification group terminals; UlCC-terminal interface; physical and logical characteristics (Release 6)
-
3GPP TS 31.101 v6.2.0, Third Generation Partnership Project, Jun.
-
3GPP Technical Specifications, Technical specification group terminals; UlCC-terminal interface; physical and logical characteristics (Release 6), 3GPP TS 31.101 v6.2.0, Third Generation Partnership Project, Jun. 2003.
-
(2003)
3GPP Technical Specifications
-
-
-
25
-
-
31344439339
-
Technical specification group services and system aspects; personalization of Mobile Equipment (ME); mobile functionality specification (Release 5)
-
3GPP TS 22.022 v5.0.0, Third Generation Partnership Project, Sep.
-
3GPP Technical Specifications, Technical specification group services and system aspects; personalization of Mobile Equipment (ME); mobile functionality specification (Release 5), 3GPP TS 22.022 v5.0.0, Third Generation Partnership Project, Sep. 2002.
-
(2002)
3GPP Technical Specifications
-
-
-
26
-
-
31344477174
-
Technical specification group terminals; security mechanisms for the (U)SIM application toolkit; stage 2 (release 5)
-
3GPP TS 23.048 v5.8.0, Third Generation Partnership Project, Dec.
-
3GPP Technical Specifications, Technical specification group terminals; security mechanisms for the (U)SIM application toolkit; Stage 2 (Release 5), 3GPP TS 23.048 v5.8.0, Third Generation Partnership Project, Dec. 2003.
-
(2003)
3GPP Technical Specifications
-
-
-
27
-
-
31344436810
-
3G security; network domain security; MAP application layer security (release 5)
-
3GPP TS 33.200 v5.1.0, Third Generation Partnership Project, Dec.
-
3GPP Technical Specifications, 3G security; network domain security; MAP application layer security (Release 5), 3GPP TS 33.200 v5.1.0, Third Generation Partnership Project, Dec. 2002.
-
(2002)
3GPP Technical Specifications
-
-
-
28
-
-
31344463082
-
Enhanced cryptographic algorithms
-
3gpp2 s.s0055 version 1.0, 3GPP2, Jan.
-
3GPP2 Technical Specifications, 3gpp2 s.s0055 version 1.0, Enhanced Cryptographic Algorithms, 3GPP2, Jan. 2002.
-
(2002)
3GPP2 Technical Specifications
-
-
-
29
-
-
31344432266
-
3G security; specification of the 3GPP confidentiality and integrity algorithms; document 1: F8 and f9 specification (release 5)
-
3GPP TS 35.201 v5.0.0, Third Generation Partnership Project, Jun.
-
3GPP Technical Specifications, 3G security; specification of the 3GPP confidentiality and integrity algorithms; document 1: f8 and f9 specification (Release 5), 3GPP TS 35.201 v5.0.0, Third Generation Partnership Project, Jun. 2002.
-
(2002)
3GPP Technical Specifications
-
-
-
30
-
-
31344440441
-
3G security; specification of the 3GPP confidentiality and integrity algorithms; document 2; KASUMI specification (release 5)
-
3GPP TS 35.202 v5.0.0, Third Generation Partnership Project, Jun.
-
3GPP Technical Specifications, 3G security; specification of the 3GPP confidentiality and integrity algorithms; document 2; KASUMI specification (Release 5), 3GPP TS 35.202 v5.0.0, Third Generation Partnership Project, Jun. 2002.
-
(2002)
3GPP Technical Specifications
-
-
-
31
-
-
31344454959
-
Common security algorithms
-
3gpp2 s.s0078 version 1.0, 3GPP2, Dec.
-
3GPP2 Technical Specifications, 3gpp2 s.s0078 version 1.0, common security algorithms, 3GPP2, Dec. 2002.
-
(2002)
3GPP2 Technical Specifications
-
-
-
32
-
-
1842765616
-
Access security in CDMA2000, including a comparison with UMTS access security
-
Feb.
-
G. Koien and G. Rose, "Access security in CDMA2000, including a comparison with UMTS access security," IEEE Wireless Commun., vol. 11, no. 1, pp. 19-25, Feb. 2004.
-
(2004)
IEEE Wireless Commun.
, vol.11
, Issue.1
, pp. 19-25
-
-
Koien, G.1
Rose, G.2
-
33
-
-
0003629990
-
-
FIPS Pub. 180-1, National Institute of Standards and Technology (N1ST), May
-
Secure Hash Standard, FIPS Pub. 180-1, National Institute of Standards and Technology (N1ST), May 1993.
-
(1993)
Secure Hash Standard
-
-
-
34
-
-
0003508558
-
-
FIPS Pub. 197, National Institute of Standards and Technology (NIST), Nov.
-
Advanced Encryption Standard, FIPS Pub. 197, National Institute of Standards and Technology (NIST), Nov. 2001.
-
(2001)
Advanced Encryption Standard
-
-
-
36
-
-
0004104571
-
Unsafe at any key size: An analysis of the WEP encapsulation
-
Mar. [Online]
-
J. Walker, "Unsafe at any key size: An analysis of the WEP encapsulation," IEEE 802.11 committee, Tech. Rep. 03628E, Mar. 2000 [Online]. Available: http://grouper.ieee.org/groups/802/11/Documents/ DocumentHolder/0-362.zi%p
-
(2000)
IEEE 802.11 Committee, Tech. Rep. 03628E
-
-
Walker, J.1
-
40
-
-
1942444534
-
The dangers of mitigating security design flaws: A wireless case study
-
Jan.
-
N. Petroni and W. Arbaugh, "The dangers of mitigating security design flaws: a wireless case study," IEEE Security Privacy, vol. 1, no. 1, pp. 28-36, Jan. 2003.
-
(2003)
IEEE Security Privacy
, vol.1
, Issue.1
, pp. 28-36
-
-
Petroni, N.1
Arbaugh, W.2
-
41
-
-
0038187631
-
WLAN problems and solutions
-
May
-
R. Housley and W.A. Arbaugh, "WLAN problems and solutions," Comm. ACM, vol. 46, no. 5, pp. 31-34, May 2003.
-
(2003)
Comm. ACM
, vol.46
, Issue.5
, pp. 31-34
-
-
Housley, R.1
Arbaugh, W.A.2
-
43
-
-
6344233247
-
Extensible authentication protocol (EAP)
-
Jun.
-
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, "Extensible Authentication Protocol (EAP)," RFC 3748, Jun. 2004.
-
(2004)
RFC
, vol.3748
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
45
-
-
0003218499
-
PPP extensible authentication protocol (EAP)
-
Mar.
-
L. Blunk and J. Vollbrecht, "PPP Extensible Authentication Protocol (EAP)," RFC 2284, Mar. 1998.
-
(1998)
RFC
, vol.2284
-
-
Blunk, L.1
Vollbrecht, J.2
-
46
-
-
0003218526
-
Remote authentication dial in user service (RADIUS)
-
Jun.
-
C. Rigney, S. Willens, A. Rubens, and W. Simpson, "Remote Authentication Dial In User Service (RADIUS)," RFC 2865, Jun. 2000.
-
(2000)
RFC
, vol.2865
-
-
Rigney, C.1
Willens, S.2
Rubens, A.3
Simpson, W.4
-
47
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Washington, DC
-
J. Bellardo and S. Savage, "802.11 denial-of-service attacks: real vulnerabilities and practical solutions," presented at the USENIX Security Symp., Washington, DC, 2003.
-
(2003)
USENIX Security Symp.
-
-
Bellardo, J.1
Savage, S.2
-
51
-
-
13244264852
-
Security issues in IEEE 802.11 wireless local-area networks: A survey
-
A. Mishra, N. L. Petroni, and W. A. Arbaugh, "Security issues in IEEE 802.11 wireless local-area networks: a survey," Wireless Commun. Mobile Comput. J. (Invited Paper), vol. 4, no. 8, pp. 821-833, 2004.
-
(2004)
Wireless Commun. Mobile Comput. J. (Invited Paper)
, vol.4
, Issue.8
, pp. 821-833
-
-
Mishra, A.1
Petroni, N.L.2
Arbaugh, W.A.3
-
52
-
-
1342282538
-
Efficient authentication and key distribution in wireless IP networks
-
Dec.
-
L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller, "Efficient authentication and key distribution in wireless IP networks," IEEE Wireless Commun., vol. 10, no. 6, pp. 52-61, Dec. 2003.
-
(2003)
IEEE Wireless Commun.
, vol.10
, Issue.6
, pp. 52-61
-
-
Salgarelli, L.1
Buddhikot, M.2
Garay, J.3
Patel, S.4
Miller, S.5
-
53
-
-
0242508595
-
EAP SIM authentication (work in progress)
-
IETF, draft-arkko-pppext-eap-sim-03.txt, Feb.
-
H. Haverinen, "EAP SIM authentication (work in progress)," Internet Draft, IETF, draft-arkko-pppext-eap-sim-03.txt, Feb. 2002.
-
(2002)
Internet Draft
-
-
Haverinen, H.1
-
54
-
-
0242508595
-
EAP AKA authentication (work in progress)
-
IETF, draft-arkko-pppext-eap-aka-12. txt, Apr.
-
J. Arkko and H. Haverinen, "EAP AKA authentication (work in progress)," Internet Draft, IETF, draft-arkko-pppext-eap-aka-12. txt, Apr. 2004.
-
(2004)
Internet Draft
-
-
Arkko, J.1
Haverinen, H.2
-
55
-
-
1642379048
-
EAP tunneled TLS authentication protocol (EAP-TTLS) (work in progress)
-
IETF, draft-ietf-pppext-eap-ttls-03.txt, Aug.
-
P. Funk and S. Blake-Wilson, "," EAP tunneled TLS authentication protocol (EAP-TTLS) (work in progress) Internet Draft, IETF, draft-ietf-pppext-eap-ttls-03.txt, Aug. 2003.
-
(2003)
Internet Draft
-
-
Funk, P.1
Blake-Wilson, S.2
-
56
-
-
0028397595
-
Authentication of mobile users
-
Mar.-Apr.
-
R. Molva, D. Samfat, and G. Tsudik, "Authentication of mobile users," IEEE Network, vol. 8, no. 2, pp. 26-34, Mar.-Apr. 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.2
, pp. 26-34
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
57
-
-
31344434322
-
Wireless Local Area Network (WLAN) interworking security
-
3G Security; TS33.234 v6.1.0, R6, Third Generation Partnership Project, Jun.
-
3GPP Technical Specifications, 3G Security; Wireless Local Area Network (WLAN) interworking security, TS33.234 v6.1.0, R6, Third Generation Partnership Project, Jun. 2004.
-
(2004)
3GPP Technical Specifications
-
-
-
58
-
-
21644441102
-
Protected EAP Protocol (PEAP) version 2 (work in progress)
-
IETF, draft-josef-sson-pppext-eap-tls-eap-08.txt, Jul.
-
A. Palekar, D. Simon, J. Salowey, H. Zhou, G. Zorn, and S. Josefsson, "Protected EAP Protocol (PEAP) version 2 (work in progress)," Internet Draft, IETF, draft-josef-sson-pppext-eap-tls-eap-08.txt, Jul. 2004.
-
(2004)
Internet Draft
-
-
Palekar, A.1
Simon, D.2
Salowey, J.3
Zhou, H.4
Zorn, G.5
Josefsson, S.6
-
60
-
-
11244321843
-
Fast authentication methods for handovers between IEEE 802.11 wireless LANs
-
M. S. Bargh, R. J. Hulsebosch, E. H. Eertink, A. Prasad, H. Wang, and P. Schoo, "Fast authentication methods for handovers between IEEE 802.11 wireless LANs," in Proc. 2nd ACM Int. Workshop Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) 2004, pp. 51-60.
-
(2004)
Proc. 2nd ACM Int. Workshop Wireless Mobile Applications and Services on WLAN Hotspots (WMASH)
, pp. 51-60
-
-
Bargh, M.S.1
Hulsebosch, R.J.2
Eertink, E.H.3
Prasad, A.4
Wang, H.5
Schoo, P.6
-
61
-
-
0038052870
-
Improving mobile authentication with new AAA protocols
-
Anchorage, AK
-
H. Kim and H. Afifi, "Improving mobile authentication with new AAA protocols," presented at the IEEE ICC (Int. Conf. Communications), Anchorage, AK, 2003.
-
(2003)
IEEE ICC (Int. Conf. Communications)
-
-
Kim, H.1
Afifi, H.2
-
62
-
-
31344436299
-
Diameter framework document (work in progress)
-
draft-ietf-aaa-diameter-framework-09.txt, Feb.
-
P. R. Calhoun, G. Zorn, P. Pan, and H. Akhtar, "Diameter framework document (work in progress)," Internet Draft, draft-ietf-aaa-diameter- framework-09.txt, Feb. 2001.
-
(2001)
Internet Draft
-
-
Calhoun, P.R.1
Zorn, G.2
Pan, P.3
Akhtar, H.4
-
63
-
-
31344438270
-
Toward efficient mobile authentication in wireless inter-domain
-
Berne, Switzerland
-
H. Kim, W. Ben-Ameur, and H. Afifi, "Toward efficient mobile authentication in wireless inter-domain," presented at the IEEE Applications and Services in Wireless Networks Conf., Berne, Switzerland, 2003.
-
(2003)
IEEE Applications and Services in Wireless Networks Conf.
-
-
Kim, H.1
Ben-Ameur, W.2
Afifi, H.3
-
64
-
-
33745178224
-
Problem description: Reason for performaing context transfers between nodes in an IP access network
-
Sep.
-
J. Kempf, "Problem description: Reason for performaing context transfers between nodes in an IP access network," RFC 3374, Sep. 2002.
-
(2002)
RFC
, vol.3374
-
-
Kempf, J.1
-
66
-
-
1542326368
-
Fast handover and context relocation in mobile networks
-
Oct.
-
R. Koodli and C. Perkins, "Fast handover and context relocation in mobile networks," ACM SIGCOMM Comput. Commun. Rev., vol. 31, no. 5, pp. 37-47, Oct. 2001.
-
(2001)
ACM SIGCOMM Comput. Commun. Rev.
, vol.31
, Issue.5
, pp. 37-47
-
-
Koodli, R.1
Perkins, C.2
-
67
-
-
1842794485
-
Context transfer protocol
-
draft-ietf-seamoby-ctp-01.txt, Mar.
-
M. Nakhjiri, C. Perkins, and R. Koodli, Context Transfer Protocol Internet Draft: draft-ietf-seamoby-ctp-01.txt, Mar. 2003.
-
(2003)
Internet Draft
-
-
Nakhjiri, M.1
Perkins, C.2
Koodli, R.3
-
68
-
-
8344271253
-
Context caching using neighbor graphs for fast handoffs in a wireless network
-
A. Mishra, M. Shin, and W. A. Arbaugh, "Context caching using neighbor graphs for fast handoffs in a wireless network," in Proc. IEEE INFOCOM 2004 pp. 351-361.
-
Proc. IEEE INFOCOM 2004
, pp. 351-361
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.A.3
-
70
-
-
21644465663
-
A method for authentication and key exchange for seamless inter-domain handovers
-
Singapore
-
R. Soltwisch, X. Fu, D. Hogrefe, and S. Narayanan, "A method for authentication and key exchange for seamless inter-domain handovers," presented at the Proc. IEEE 14th Int. Conf. Networks (ICON 2004), Singapore.
-
Proc. IEEE 14th Int. Conf. Networks (ICON 2004)
-
-
Soltwisch, R.1
Fu, X.2
Hogrefe, D.3
Narayanan, S.4
-
72
-
-
0003237987
-
The kerberos network authentication service (V5)
-
Sep.
-
J. Kohl and C. Neuman, "The Kerberos Network Authentication Service (V5)," RFC 1510, Sep. 1993.
-
(1993)
RFC
, vol.1510
-
-
Kohl, J.1
Neuman, C.2
-
73
-
-
1642412044
-
Secure authentication system for public WLAN roaming
-
Y. Matsunaga, A. S. Merino, T. Suzuki, and R. H. Katz, "Secure authentication system for public WLAN roaming," in Proc. 1st ACM Int. Workshop Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) 2003, pp. 113-121.
-
(2003)
Proc. 1st ACM Int. Workshop Wireless Mobile Applications and Services on WLAN Hotspots (WMASH)
, pp. 113-121
-
-
Matsunaga, Y.1
Merino, A.S.2
Suzuki, T.3
Katz, R.H.4
-
74
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sep.
-
B. C. Neuman and T. Ts'o, "Kerberos: An authentication service for computer networks," IEEE Commun., vol. 32, no. 9, pp. 33-38, Sep. 1994.
-
(1994)
IEEE Commun.
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
75
-
-
31344447647
-
A real-world analysis of Kerberos password security
-
San Diego, CA
-
T. Wu, "A real-world analysis of Kerberos password security," presented at the Network and Distributed System Security Symp. (NDSS), San Diego, CA, 2003.
-
(2003)
Network and Distributed System Security Symp. (NDSS)
-
-
Wu, T.1
|