|
Volumn 2, Issue , 2006, Pages 1026-1030
|
The design of key security in ethernet PON
|
Author keywords
Authentication; EPON; Key; Key management; Key security; Mac security; PRF
|
Indexed keywords
AUTHENTICATION;
ETHERNET;
KEY MANAGEMENT;
KEY SECURITY;
COMPUTER NETWORKS;
CRYPTOGRAPHY;
DATA ACQUISITION;
NETWORK PROTOCOLS;
TELECOMMUNICATION TRAFFIC;
SECURITY OF DATA;
|
EID: 33750932927
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (4)
|
References (7)
|