메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 460-465

Issues in initializing security

Author keywords

Bootstrapping; Initialization; Mobility; Security; Trust

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; INDEXING (OF INFORMATION); NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33846983251     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSPIT.2005.1577141     Document Type: Conference Paper
Times cited : (7)

References (26)
  • 1
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad-hoc networks
    • November
    • N. Asokan et al; "Key agreement in ad-hoc networks," Computer Communications, 23(17):1627-1637, November 2000.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1
  • 2
    • 33846944919 scopus 로고    scopus 로고
    • Phil Agre; The architecture of identity: Embedding privacy in market institutions, Information, Communication and Society 2(1), 1999, pp 1-25. Also available at http://polaris.gseis.ucla.edu/pagre/ architecture.html. See also a posting to the Red Rock Eater mailing list available at http://groups.yahoo.com/group/rre/message/1318, August 2000.
    • Phil Agre; "The architecture of identity: Embedding privacy in market institutions", Information, Communication and Society 2(1), 1999, pp 1-25. Also available at http://polaris.gseis.ucla.edu/pagre/ architecture.html. See also a posting to the Red Rock Eater mailing list available at http://groups.yahoo.com/group/rre/message/1318, August 2000.
  • 4
    • 33846979000 scopus 로고    scopus 로고
    • Generic Authentication Architecture (GAA); Generic bootstrapping architecture
    • available from, March
    • 3GPP TS 33.220; "Generic Authentication Architecture (GAA); Generic bootstrapping architecture", available from http://www.3gpp.org/ ftp/Specs/html-info/33220.htm, March 2005
    • (2005) 3GPP TS 33.220
  • 5
    • 33846951038 scopus 로고    scopus 로고
    • Generic Authentication Architecture (GAA); System Description
    • available from, March
    • 3GPP TR 33.919; "Generic Authentication Architecture (GAA); System Description", available from http://www.3gpp.org/ftp/Specs/html- info/33919.htm, March 2005.
    • (2005) 3GPP TR 33.919
  • 6
    • 33846956366 scopus 로고    scopus 로고
    • Aki Niemi et al; Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA), Internet Engineering Task Force, RFC 3310, available at http://www.ietf.org/rfc/ rfc3310.txt, September 2002.
    • Aki Niemi et al; "Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA)", Internet Engineering Task Force, RFC 3310, available at http://www.ietf.org/rfc/ rfc3310.txt, September 2002.
  • 7
    • 33846942863 scopus 로고    scopus 로고
    • Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)
    • available at, June
    • Pasi Eronen et al; "Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)", Interenet Engineering Task Force, Internet Draft, available at http://www.ietf.org/internet-drafts-ieft-tls-psk-09. txt, June 2005.
    • (2005) Interenet Engineering Task Force, Internet Draft
    • Eronen, P.1
  • 8
    • 33846979358 scopus 로고    scopus 로고
    • John Franks et al; HTTP Authentication: Basic and Digest Access Authentication, Internet Engineering Task Force, RFC 2617, available at http://www.ietf.org/rfc/rfc2617.txt, June 1999.
    • John Franks et al; "HTTP Authentication: Basic and Digest Access Authentication", Internet Engineering Task Force, RFC 2617, available at http://www.ietf.org/rfc/rfc2617.txt, June 1999.
  • 9
    • 33846972896 scopus 로고    scopus 로고
    • 3GPP TS 33.221; Generic Authentication Architecture (GAA); Support for subscriber certificates, available from http://www.3gpp. org/ftp/Specs/html-info/33221.htm. December 2004.
    • 3GPP TS 33.221; "Generic Authentication Architecture (GAA); Support for subscriber certificates", available from http://www.3gpp. org/ftp/Specs/html-info/33221.htm. December 2004.
  • 10
    • 4944267395 scopus 로고    scopus 로고
    • Internet Key Exchange (IKEv2) Protocol
    • Charlie Kaufman Editor, available at, September
    • Charlie Kaufman (Editor); "Internet Key Exchange (IKEv2) Protocol", Internet Engineering Task Force, Internet Draft, available at http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-17. txt, September 2004.
    • (2004) Internet Engineering Task Force, Internet Draft
  • 11
    • 33645672701 scopus 로고    scopus 로고
    • Man-in-the-middle in Tunnelled Authentication protocols
    • th International Workshop on Security Protocols, available at, April
    • th International Workshop on Security Protocols, Springer LNCS 3364, pp28-42, available at http://www.saunalahti.fi/~asokan/research/mitm.html. April 2003.
    • (2003) Springer LNCS , vol.3364 , pp. 28-42
    • Asokan, N.1
  • 12
    • 0001831930 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks
    • th International Workshop on Security Protocols, April
    • th International Workshop on Security Protocols, LNCS 1796, April 1999.
    • (1999) LNCS , vol.1796
    • Stajano, F.1
  • 13
    • 3042662152 scopus 로고    scopus 로고
    • Talking to strangers: Authentication in ad-hoc wireless networks
    • February 6-8; San Diego; CA; USA
    • Dirk Balfanz et al; "Talking to strangers: authentication in ad-hoc wireless networks" in Proc. Network and Distributed System Security Symposium; 2002 February 6-8; San Diego; CA; USA.
    • (2002) Proc. Network and Distributed System Security Symposium
    • Balfanz, D.1
  • 14
    • 33846941810 scopus 로고    scopus 로고
    • Jonathan McCune et al; Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication, (to appear) in the Proc. of the IEEE Symposium of Security and Privacy, May 2005, available at http://sparrow.ece.cmu.edu%7Eadrian/projects/sib.pdf
    • Jonathan McCune et al; Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication, (to appear) in the Proc. of the IEEE Symposium of Security and Privacy, May 2005, available at http://sparrow.ece.cmu.edu%7Eadrian/projects/sib.pdf
  • 16
    • 33846317975 scopus 로고    scopus 로고
    • Easy and Secure Setup of Personal Wireless Networks
    • November, available at
    • Amol Kulkarni et al; "Easy and Secure Setup of Personal Wireless Networks", Technology@Intel Magazine, November 2004, available at http://www.intel.com/technology/magazine/communications/wi11042. pdf
    • (2004) Technology@Intel Magazine
    • Kulkarni, A.1
  • 18
    • 85084164692 scopus 로고    scopus 로고
    • SSH - Secure Login Connections over the Internet
    • Tatu Ylönen; "SSH - Secure Login Connections over the Internet," Proc. Sixth Usenix Security Symposium, pp 37-42, 1996
    • (1996) Proc. Sixth Usenix Security Symposium , pp. 37-42
    • Ylönen, T.1
  • 19
    • 0001126172 scopus 로고
    • Pricing via Processing or Combating Junk Mail
    • Cynthia Dwork et al; "Pricing via Processing or Combating Junk Mail", Advances in Cryptology, CRYPTO'92, 1992
    • (1992) Advances in Cryptology, CRYPTO'92
    • Dwork, C.1
  • 20
    • 44349087977 scopus 로고    scopus 로고
    • Hashcash - Amortizable Publicly Auditable Cost-Functions
    • Tech Report, available at
    • Adam Back; "Hashcash - Amortizable Publicly Auditable Cost-Functions", Tech Report, available at http://www.hashcash. org/papers/, 2002
    • (2002)
    • Back, A.1
  • 22
    • 35248835679 scopus 로고    scopus 로고
    • On Memory-Bound Functions for Fighting Spam
    • CRYPTO 2003, Available from
    • Cynthia Dwork et al; "On Memory-Bound Functions for Fighting Spam", CRYPTO 2003, LNCS 2729. Available from http://research. microsoll.com/research/pubs/view.aspx?type=Publicatio n&id-1094, 2003.
    • (2003) LNCS , vol.2729
    • Dwork, C.1
  • 23
    • 33846955664 scopus 로고    scopus 로고
    • Ben Laurie et al; Proof-of-Work proves not to work, WEAS 04, available from http://www.hashcash.org/papers/proof-work.pdf. 2004.
    • Ben Laurie et al; "Proof-of-Work proves not to work", WEAS 04, available from http://www.hashcash.org/papers/proof-work.pdf. 2004.
  • 24
    • 33644499772 scopus 로고    scopus 로고
    • Seamus Moloney; Simulation of a distributed recommendation system for pervasive networks, Proc. 20th Annual ACM Symposium on Applied Computing TRECK track, Santa Fe, New Mexico, March 13 17, 2005
    • Seamus Moloney; "Simulation of a distributed recommendation system for pervasive networks", Proc. 20th Annual ACM Symposium on Applied Computing TRECK track, Santa Fe, New Mexico, March 13 17, 2005


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.