메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 127-138

Improving cross-domain authentication over wireless local area networks

Author keywords

[No Author keywords available]

Indexed keywords

HIERARCHICAL SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SERVERS; STANDARDS;

EID: 33847263581     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURECOMM.2005.24     Document Type: Conference Paper
Times cited : (14)

References (37)
  • 2
    • 33847330693 scopus 로고    scopus 로고
    • Secure Hash Standard. In Federal Information Processing Standards Publication 180-1. NIST, Apr. 1995.
    • Secure Hash Standard. In Federal Information Processing Standards Publication 180-1. NIST, Apr. 1995.
  • 3
    • 33847277866 scopus 로고    scopus 로고
    • Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Specification for Robust Security. In ANSI/IEEE Std 802.11: 1999(E). ISO/IEC 8802-11, 1999.
    • Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Specification for Robust Security. In ANSI/IEEE Std 802.11: 1999(E). ISO/IEC 8802-11, 1999.
  • 4
    • 33847246843 scopus 로고    scopus 로고
    • Advanced Encryption Standard (AES). In Federal Information Processing Standards Publication 197. NIST, Nov. 2001.
    • Advanced Encryption Standard (AES). In Federal Information Processing Standards Publication 197. NIST, Nov. 2001.
  • 5
    • 33847254900 scopus 로고    scopus 로고
    • Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Specification for Robust Security. In IEEE Std 802.11i/D3.1.ISO/IEC 8802-11, 2003.
    • Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Specification for Robust Security. In IEEE Std 802.11i/D3.1.ISO/IEC 8802-11, 2003.
  • 9
    • 0031642585 scopus 로고    scopus 로고
    • A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
    • ACM Press
    • M. Bellare, R. Canetti, and H. Krawczyk. A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In 30th Symposium on Theory of Computing, pages 419-428. ACM Press, 1998.
    • (1998) 30th Symposium on Theory of Computing , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 11
    • 84885887648 scopus 로고    scopus 로고
    • W. Dai. Crypto++, http://www.eskimo.com/~weidai/cryptlib.html.
    • Crypto
    • Dai, W.1
  • 12
    • 33847317939 scopus 로고    scopus 로고
    • T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC 2246, Jan. 1999
    • T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC 2246, Jan. 1999.
  • 13
    • 0033683607 scopus 로고    scopus 로고
    • Towards automatic verification of authentication protocols on an unbounded network
    • IEEE Computer Society
    • Heather and Schneider. Towards automatic verification of authentication protocols on an unbounded network. In 13th Computer Security Foundations Workshop, page 132. IEEE Computer Society, 2000.
    • (2000) 13th Computer Security Foundations Workshop , pp. 132
    • Heather1    Schneider2
  • 15
    • 33847300999 scopus 로고    scopus 로고
    • B. Kaliski. PKCS #1 RSA Encryption Version 1.5. RFC 2313, Mar. 1998
    • B. Kaliski. PKCS #1 RSA Encryption Version 1.5. RFC 2313, Mar. 1998.
  • 18
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems TACAS
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055, pages 147-166. LNCS, 1996.
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 19
    • 84893561028 scopus 로고    scopus 로고
    • Using spin to verify security properties of cryptographic protocols
    • 9th SPIN Workshop on Model Checking of Software
    • P. Maggi and R. Sisto. Using spin to verify security properties of cryptographic protocols. In 9th SPIN Workshop on Model Checking of Software, volume 2318, pages 187-204. LNCS, 2001.
    • (2001) LNCS , vol.2318 , pp. 187-204
    • Maggi, P.1    Sisto, R.2
  • 20
    • 84955602379 scopus 로고
    • Formal Verification of Cryptographic Protocols: A Survey
    • ASIACRYPT: Int. Conf. on the Theory and Application of Cryptology, Dec
    • C. A. Meadows. Formal Verification of Cryptographic Protocols: A Survey. In ASIACRYPT: Int. Conf. on the Theory and Application of Cryptology, volume 917, pages 135-150. LNCS, Dec. 1994.
    • (1994) LNCS , vol.917 , pp. 135-150
    • Meadows, C.A.1
  • 21
  • 22
    • 8344271253 scopus 로고    scopus 로고
    • Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network
    • Hong Kong, Mar
    • A. Mishra, M. Shin, and W. Arbaugh. Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network. In IEEE Infocom 2004, Hong Kong, Mar. 2004.
    • (2004) IEEE Infocom 2004
    • Mishra, A.1    Shin, M.2    Arbaugh, W.3
  • 23
    • 1842665111 scopus 로고    scopus 로고
    • Pro-active Key Distribution using Neighbor Graphs
    • Feb
    • A. Mishra, M. Shin, and W. Arbaugh. Pro-active Key Distribution using Neighbor Graphs. Wireless Comm. Magazine, 11 Issue 1:26-36, Feb. 2004.
    • (2004) Wireless Comm. Magazine , vol.11 , Issue.1 , pp. 26-36
    • Mishra, A.1    Shin, M.2    Arbaugh, W.3
  • 24
    • 0030705405 scopus 로고    scopus 로고
    • Automated analysis of cryptographic protocols using murφ
    • IEEE Computer Society
    • J. C. Mitchell, M. Mitchell, and U. Stern. Automated analysis of cryptographic protocols using murφ. In Symposium on Security and Privacy, pages 141-153. IEEE Computer Society, 1997.
    • (1997) Symposium on Security and Privacy , pp. 141-153
    • Mitchell, J.C.1    Mitchell, M.2    Stern, U.3
  • 26
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Comm. of the ACM, 21(12):993-999, 1978.
    • (1978) Comm. of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 28
  • 29
    • 84904326049 scopus 로고    scopus 로고
    • Pre-Authenticated Fast Hand-off in a Public Wireless LAN based on IEEE 802.1x Model
    • Singapore, Oct
    • S. Pack and Y. Choi. Pre-Authenticated Fast Hand-off in a Public Wireless LAN based on IEEE 802.1x Model. In IFIP TC6 Personal. Wireless Comm. 2002, Singapore, Oct. 2002.
    • (2002) IFIP TC6 Personal. Wireless Comm. 2002
    • Pack, S.1    Choi, Y.2
  • 31
    • 0024714097 scopus 로고
    • Integrating security in a large distributed system
    • M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-280, 1989.
    • (1989) ACM Transactions on Computer Systems , vol.7 , Issue.3 , pp. 247-280
    • Satyanarayanan, M.1
  • 32
    • 4544325271 scopus 로고    scopus 로고
    • Improving the Latency of 802.11 hand-offs using Neighbor Graphs
    • Boston, Jun
    • M. Shin, A. Mishra, and W. Arbaugh. Improving the Latency of 802.11 hand-offs using Neighbor Graphs. In ACM Mobisys 2004, Boston, Jun. 2004.
    • (2004) ACM Mobisys 2004
    • Shin, M.1    Mishra, A.2    Arbaugh, W.3
  • 34
    • 84946838086 scopus 로고    scopus 로고
    • Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
    • ASIACRYPT: Int. Conf. on the Theory and Application of Cryptology and Information Security
    • D. S. Wong and A. H. Chan. Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. In ASIACRYPT: Int. Conf. on the Theory and Application of Cryptology and Information Security, volume 2248, pages 272-289. LNCS, 2001.
    • (2001) LNCS , vol.2248 , pp. 272-289
    • Wong, D.S.1    Chan, A.H.2
  • 35
    • 0035727184 scopus 로고    scopus 로고
    • Mutual Authentication and Key Exchange for Low Power Wireless Communications
    • USA, Oct, IEEE Press
    • D. S. Wong and A. H. Chan. Mutual Authentication and Key Exchange for Low Power Wireless Communications. In MILCOM 2001, pages 39-43, USA, Oct. 2001. IEEE Press.
    • (2001) MILCOM 2001 , pp. 39-43
    • Wong, D.S.1    Chan, A.H.2
  • 36
    • 33847335523 scopus 로고    scopus 로고
    • T. Y. C. Woo and S. S. Lam. A Lesson on Authentication Protocol Design. ACM SIGOPS: Operating Systems Review, 28(3):24-37, 1994.
    • T. Y. C. Woo and S. S. Lam. A Lesson on Authentication Protocol Design. ACM SIGOPS: Operating Systems Review, 28(3):24-37, 1994.
  • 37
    • 0042408342 scopus 로고    scopus 로고
    • Using SMV for cryptographic protocol analysis: A case study
    • Apr
    • Y. Zhang, C. Wang, J. Wu, and X. Li. Using SMV for cryptographic protocol analysis: a case study. ACM SIGOPS: Operating Systems Review, 35(2):43-50, Apr. 2001.
    • (2001) ACM SIGOPS: Operating Systems Review , vol.35 , Issue.2 , pp. 43-50
    • Zhang, Y.1    Wang, C.2    Wu, J.3    Li, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.