메뉴 건너뛰기




Volumn 51, Issue 3, 2007, Pages 655-670

Access control protocols with two-layer architecture for wireless networks

Author keywords

Access control; Security protocol; Wireless networks

Indexed keywords

DATA PRIVACY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SECURITY SYSTEMS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33751253442     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2006.05.009     Document Type: Article
Times cited : (6)

References (31)
  • 1
    • 33751241094 scopus 로고    scopus 로고
    • W. Aliello et al., Just fast keying (JFK), IETF Draft (work in progress). Available from: , July 2002.
  • 2
    • 0038687767 scopus 로고    scopus 로고
    • W. Aliello et al., Efficient, DoS-resistant, secure key exchange for internet protocols, in: Proceedings of ACM Conference on Computer and Communication Security, November 2002.
  • 3
    • 0028272762 scopus 로고
    • Privacy authentication for wireless local area networks
    • Aziz A., and Diffie W. Privacy authentication for wireless local area networks. IEEE Personal Communications First Quarter (1994) 25-31
    • (1994) IEEE Personal Communications , vol.First Quarter , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 4
    • 33751258229 scopus 로고    scopus 로고
    • K. Aoki, H. Lipmaa, Fast implementations of AES candidates, Third AES Candidate Conference, New York City, USA, 13-14 April 2000.
  • 5
    • 33751257724 scopus 로고    scopus 로고
    • W.A. Arbaugh, N. Shankar, J. Wang, Your 802.11 networks has no clothes, in: Proceedings of the First IEEE International Conference on Wireless LANs and Home Networks, December 2001.
  • 7
    • 85084160050 scopus 로고    scopus 로고
    • S.M. Bellovin, Problem areas for the IP security protocols, in: Proceedings of the 6th USENIX Security Symposium, San Jose, California, July 1996.
  • 8
    • 85177240169 scopus 로고    scopus 로고
    • N. Borisov, I. Goldberg, D. Wagner, Intercepting mobile communications: the insecurity of 802.11, in: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, 16-21 July 2001.
  • 11
    • 33751251318 scopus 로고    scopus 로고
    • C. Boyd, D.-G. Park, Public key protocols for wireless communications, in: Proceedings of the 1998 International Conference on Information Security and Cryptology (ICISC'98), 1998.
  • 12
    • 33751236136 scopus 로고    scopus 로고
    • P. Funk, EAP Tunneled TLS Authentication Protocol Version 1, IETF Draft. Available from: , February 2005.
  • 13
    • 33751239715 scopus 로고    scopus 로고
    • B. Aboba, D. Simon, PPP EAP TLS Authentication Protocol, IETF RFC 2716, October 1996.
  • 14
    • 33751256513 scopus 로고    scopus 로고
    • S. Josefsson et al., Protected EAP Protocol (PEAP), IETF Draft (work in progress). Available from: , October 2004.
  • 15
    • 33751218853 scopus 로고    scopus 로고
    • Cisco, Cisco LEAP protocol description. Available from: , September 2001.
  • 16
    • 0036983653 scopus 로고    scopus 로고
    • D.B. Faria, D.R. Cheriton, Dos and authentication in wireless public access networks, in: Proceedings of ACM Workshop on Wireless Security, September 2002.
  • 17
    • 0038545435 scopus 로고    scopus 로고
    • Network layer access control for context-aware IPv6 applications
    • Friday A., et al. Network layer access control for context-aware IPv6 applications. Wireless Networks 9 (2003) 299-309
    • (2003) Wireless Networks , vol.9 , pp. 299-309
    • Friday, A.1
  • 18
    • 33751243285 scopus 로고    scopus 로고
    • C. Kaufman, Internet key exchange (IKEv2) protocol, IETF Draft (work in progress). Available from: , June 2004.
  • 19
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • Jablon D.P. Strong password-only authenticated key exchange. ACM Computer Communications Review 26 5 (1996)
    • (1996) ACM Computer Communications Review , vol.26 , Issue.5
    • Jablon, D.P.1
  • 20
    • 33751257114 scopus 로고    scopus 로고
    • S. Kent, R. Atkinson, IP Authentication header, IETF Standards Track RFC 2402, November 1998.
  • 21
    • 33751207671 scopus 로고    scopus 로고
    • T. Kwon, Authentication and key agreement via memorable password, in: Proceedings of the ISOC NDSS Symposium, 2001.
  • 22
    • 33751204109 scopus 로고    scopus 로고
    • A. Mishra, W.A. Arbaugh, An initial security analysis of the IEEE 802.1X Standard, Technical Report CS-TR-4328, UMIACS-TR-2002-10, University of Maryland, February 2002.
  • 23
    • 33751219186 scopus 로고    scopus 로고
    • LAN MAN Standards Committee of the IEEE Computer Society, Wireless LAN medium access control (MAC) and physical layer (PHY) specification, IEEE Standard 802.11, 1997 Edition, 1997.
  • 24
    • 33751256819 scopus 로고    scopus 로고
    • LAN MAN Standards Committee of the IEEE Computer Society, Standard for Port Based Network Access Control, Technical Report Draft P802.1X/D11, IEEE Computer Society, March 2001.
  • 25
    • 33751235546 scopus 로고    scopus 로고
    • LAN MAN Standards Committee of the IEEE Computer Society, Amendment 6: Medium Access Control (MAC) Security Enhancements, IEEE Standards P802.11i, June 2004.
  • 26
    • 84937579448 scopus 로고    scopus 로고
    • More efficient password-authenticated key exchange
    • MacKenzie P. More efficient password-authenticated key exchange. Progress in Cryptology - CT-RSA 2001 (2001) 361-377
    • (2001) Progress in Cryptology - CT-RSA 2001 , pp. 361-377
    • MacKenzie, P.1
  • 27
    • 33751229870 scopus 로고    scopus 로고
    • B. Preneel et al., Performance of optimized implementations of the NESSIE primitives, NESSIE Report, Deliverable D12, February 2003.
  • 28
    • 0035208985 scopus 로고    scopus 로고
    • S. Schmid et al., An access control architecture for microcellular wireless IPv6 networks, in: Proceedings of 26th IEEE Conference on Local Computer Networks (LCN'2001), 2001, pp. 454-463.
  • 29
    • 33751216717 scopus 로고    scopus 로고
    • M. Scott, Multiprecision integer and rational arithmetic C/C++ library, Shamus Software Ltd. Available from: .
  • 30
    • 33751242700 scopus 로고    scopus 로고
    • W. Dai, Crypto++ 5.1 Benchmarks. Available from: .
  • 31
    • 33751221567 scopus 로고    scopus 로고
    • T. Wu, Secure remote password protocol, ISOC Network and Distributed System Security Symposium, 1998.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.