-
2
-
-
33847330693
-
-
Secure Hash Standard. In Federal Information Processing Standards Publication 180-1. NIST, Apr. 1995.
-
Secure Hash Standard. In Federal Information Processing Standards Publication 180-1. NIST, Apr. 1995.
-
-
-
-
3
-
-
33847277866
-
-
Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Specification for Robust Security. In ANSI/IEEE Std 802.11: 1999(E). ISO/IEC 8802-11, 1999.
-
Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Specification for Robust Security. In ANSI/IEEE Std 802.11: 1999(E). ISO/IEC 8802-11, 1999.
-
-
-
-
4
-
-
33847246843
-
-
Advanced Encryption Standard (AES). In Federal Information Processing Standards Publication 197. NIST, Nov. 2001.
-
Advanced Encryption Standard (AES). In Federal Information Processing Standards Publication 197. NIST, Nov. 2001.
-
-
-
-
5
-
-
33847254900
-
-
Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Specification for Robust Security. In IEEE Std 802.11i/D3.1.ISO/IEC 8802-11, 2003.
-
Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Specification for Robust Security. In IEEE Std 802.11i/D3.1.ISO/IEC 8802-11, 2003.
-
-
-
-
7
-
-
0038687767
-
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
-
ACM Press
-
W. Aiello, S. M. Bellovin, M. Blaze, R. C. J. Ioannidis, A. D. Keromytis, and O. Reingold. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. In Conf. on Computer and Comm. Security. ACM Press, 2002.
-
(2002)
Conf. on Computer and Comm. Security
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Ioannidis, R.C.J.4
Keromytis, A.D.5
Reingold, O.6
-
9
-
-
0031642585
-
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
-
ACM Press
-
M. Bellare, R. Canetti, and H. Krawczyk. A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In 30th Symposium on Theory of Computing, pages 419-428. ACM Press, 1998.
-
(1998)
30th Symposium on Theory of Computing
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
10
-
-
0025386404
-
A Logic of Authentication
-
M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. ACM Transactions on Computer Systems, 8(1): 18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
11
-
-
84885887648
-
-
W. Dai. Crypto++, http://www.eskimo.com/~weidai/cryptlib.html.
-
Crypto
-
-
Dai, W.1
-
12
-
-
33847317939
-
-
T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC 2246, Jan. 1999
-
T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC 2246, Jan. 1999.
-
-
-
-
13
-
-
0033683607
-
Towards automatic verification of authentication protocols on an unbounded network
-
IEEE Computer Society
-
Heather and Schneider. Towards automatic verification of authentication protocols on an unbounded network. In 13th Computer Security Foundations Workshop, page 132. IEEE Computer Society, 2000.
-
(2000)
13th Computer Security Foundations Workshop
, pp. 132
-
-
Heather1
Schneider2
-
15
-
-
33847300999
-
-
B. Kaliski. PKCS #1 RSA Encryption Version 1.5. RFC 2313, Mar. 1998
-
B. Kaliski. PKCS #1 RSA Encryption Version 1.5. RFC 2313, Mar. 1998.
-
-
-
-
18
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems TACAS
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055, pages 147-166. LNCS, 1996.
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
19
-
-
84893561028
-
Using spin to verify security properties of cryptographic protocols
-
9th SPIN Workshop on Model Checking of Software
-
P. Maggi and R. Sisto. Using spin to verify security properties of cryptographic protocols. In 9th SPIN Workshop on Model Checking of Software, volume 2318, pages 187-204. LNCS, 2001.
-
(2001)
LNCS
, vol.2318
, pp. 187-204
-
-
Maggi, P.1
Sisto, R.2
-
20
-
-
84955602379
-
Formal Verification of Cryptographic Protocols: A Survey
-
ASIACRYPT: Int. Conf. on the Theory and Application of Cryptology, Dec
-
C. A. Meadows. Formal Verification of Cryptographic Protocols: A Survey. In ASIACRYPT: Int. Conf. on the Theory and Application of Cryptology, volume 917, pages 135-150. LNCS, Dec. 1994.
-
(1994)
LNCS
, vol.917
, pp. 135-150
-
-
Meadows, C.A.1
-
21
-
-
26444494997
-
An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process
-
A. Mishra, M. Shin, and W. Arbaugh. An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process. ACM SIGCOMM: Computer Communications Review, 33(2):93-102, 2003.
-
(2003)
ACM SIGCOMM: Computer Communications Review
, vol.33
, Issue.2
, pp. 93-102
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.3
-
22
-
-
8344271253
-
Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network
-
Hong Kong, Mar
-
A. Mishra, M. Shin, and W. Arbaugh. Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network. In IEEE Infocom 2004, Hong Kong, Mar. 2004.
-
(2004)
IEEE Infocom 2004
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.3
-
23
-
-
1842665111
-
Pro-active Key Distribution using Neighbor Graphs
-
Feb
-
A. Mishra, M. Shin, and W. Arbaugh. Pro-active Key Distribution using Neighbor Graphs. Wireless Comm. Magazine, 11 Issue 1:26-36, Feb. 2004.
-
(2004)
Wireless Comm. Magazine
, vol.11
, Issue.1
, pp. 26-36
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.3
-
24
-
-
0030705405
-
Automated analysis of cryptographic protocols using murφ
-
IEEE Computer Society
-
J. C. Mitchell, M. Mitchell, and U. Stern. Automated analysis of cryptographic protocols using murφ. In Symposium on Security and Privacy, pages 141-153. IEEE Computer Society, 1997.
-
(1997)
Symposium on Security and Privacy
, pp. 141-153
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
26
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Comm. of the ACM, 21(12):993-999, 1978.
-
(1978)
Comm. of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
29
-
-
84904326049
-
Pre-Authenticated Fast Hand-off in a Public Wireless LAN based on IEEE 802.1x Model
-
Singapore, Oct
-
S. Pack and Y. Choi. Pre-Authenticated Fast Hand-off in a Public Wireless LAN based on IEEE 802.1x Model. In IFIP TC6 Personal. Wireless Comm. 2002, Singapore, Oct. 2002.
-
(2002)
IFIP TC6 Personal. Wireless Comm. 2002
-
-
Pack, S.1
Choi, Y.2
-
31
-
-
0024714097
-
Integrating security in a large distributed system
-
M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-280, 1989.
-
(1989)
ACM Transactions on Computer Systems
, vol.7
, Issue.3
, pp. 247-280
-
-
Satyanarayanan, M.1
-
32
-
-
4544325271
-
Improving the Latency of 802.11 hand-offs using Neighbor Graphs
-
Boston, Jun
-
M. Shin, A. Mishra, and W. Arbaugh. Improving the Latency of 802.11 hand-offs using Neighbor Graphs. In ACM Mobisys 2004, Boston, Jun. 2004.
-
(2004)
ACM Mobisys 2004
-
-
Shin, M.1
Mishra, A.2
Arbaugh, W.3
-
34
-
-
84946838086
-
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
-
ASIACRYPT: Int. Conf. on the Theory and Application of Cryptology and Information Security
-
D. S. Wong and A. H. Chan. Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. In ASIACRYPT: Int. Conf. on the Theory and Application of Cryptology and Information Security, volume 2248, pages 272-289. LNCS, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 272-289
-
-
Wong, D.S.1
Chan, A.H.2
-
35
-
-
0035727184
-
Mutual Authentication and Key Exchange for Low Power Wireless Communications
-
USA, Oct, IEEE Press
-
D. S. Wong and A. H. Chan. Mutual Authentication and Key Exchange for Low Power Wireless Communications. In MILCOM 2001, pages 39-43, USA, Oct. 2001. IEEE Press.
-
(2001)
MILCOM 2001
, pp. 39-43
-
-
Wong, D.S.1
Chan, A.H.2
-
36
-
-
33847335523
-
-
T. Y. C. Woo and S. S. Lam. A Lesson on Authentication Protocol Design. ACM SIGOPS: Operating Systems Review, 28(3):24-37, 1994.
-
T. Y. C. Woo and S. S. Lam. A Lesson on Authentication Protocol Design. ACM SIGOPS: Operating Systems Review, 28(3):24-37, 1994.
-
-
-
-
37
-
-
0042408342
-
Using SMV for cryptographic protocol analysis: A case study
-
Apr
-
Y. Zhang, C. Wang, J. Wu, and X. Li. Using SMV for cryptographic protocol analysis: a case study. ACM SIGOPS: Operating Systems Review, 35(2):43-50, Apr. 2001.
-
(2001)
ACM SIGOPS: Operating Systems Review
, vol.35
, Issue.2
, pp. 43-50
-
-
Zhang, Y.1
Wang, C.2
Wu, J.3
Li, X.4
|