메뉴 건너뛰기




Volumn 29, Issue 4, 2006, Pages 576-580

On the security of the key-agreement protocol of Chinese WLAN standard implementation plan

Author keywords

Canetti Krawczyk model; Key agreement protocol; WAPI; WLAN

Indexed keywords

LOCAL AREA NETWORKS; NETWORK PROTOCOLS;

EID: 33745002452     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (5)

References (8)
  • 1
    • 0141981548 scopus 로고    scopus 로고
    • GB 15629.11-2003 (information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements - Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications)
    • National Standard of the People's Republic of China, Chinese source
    • National Standard of the People's Republic of China. GB 15629.11-2003 (Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications). 2003 (in Chinese)
    • (2003)
  • 2
    • 13244293318 scopus 로고    scopus 로고
    • Guide for GB 15629.11-2003 (information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements
    • National Standard of the People's Republic of China, Chinese source
    • National Standard of the People's Republic of China. Guide for GB 15629.11-2003 (Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications) and GB 15629.1102-2003 (Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher-Speed Physical layer Extension in the 2.4 GHz Band). 2004.3 (in Chinese)
    • (2004)
  • 3
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channel
    • Denmark
    • Canetti R., Krawczyk H.. Analysis of key-exchange protocols and their use for building secure channel. In: Proceedings of the Eurocrypt 01, Denmark, 2001, 453-474
    • (2001) Proceedings of the Eurocrypt 01 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 5
    • 84969368443 scopus 로고
    • An identity-based key-exchange protocol
    • Belgium
    • Güther C. G.. An identity-based key-exchange protocol. In: Proceedings of the Eurocrypt 89, Belgium, 1990, 29-37
    • (1990) Proceedings of the Eurocrypt 89 , pp. 29-37
    • Güther, C.G.1
  • 6
    • 11344250619 scopus 로고    scopus 로고
    • Beijing: Publishing House of Electronics Industry, Chinese source
    • Mao Wen-Bo. Modern Cryptography: Theory and Practice. Beijing: Publishing House of Electronics Industry, 2004 (in Chinese)
    • (2004) Modern Cryptography: Theory and Practice
    • Mao, W.-B.1
  • 7
    • 0142002517 scopus 로고    scopus 로고
    • The exact security of ECDSA
    • Department of C&O, University of Waterloo, Waterloo: Technical Report CORR 2000-54
    • Brown D. R. L.. The exact security of ECDSA. Department of C&O, University of Waterloo, Waterloo: Technical Report CORR 2000-54, 2001
    • (2001)
    • Brown, D.R.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.