메뉴 건너뛰기




Volumn 12, Issue 1, 2007, Pages 59-62

Key management protocol of the IEEE 802.16e

Author keywords

IEEE 802.16e; Key management protocol; Security analysis

Indexed keywords


EID: 33947576784     PISSN: 10071202     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11859-006-0187-x     Document Type: Article
Times cited : (11)

References (9)
  • 1
    • 33947572981 scopus 로고    scopus 로고
    • IEEE Standard for Local and Metropolitan Area Networks. Air Interface for Fixed and mobile Broadband Wireless Access Systems, IEEE Std 802.16e [S]. New York: IEEE Press, 2006.
    • IEEE Standard for Local and Metropolitan Area Networks. Air Interface for Fixed and mobile Broadband Wireless Access Systems, IEEE Std 802.16e [S]. New York: IEEE Press, 2006.
  • 2
    • 33947597527 scopus 로고    scopus 로고
    • IEEE Standard for Local and Metropolitan Area Networks. Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std 802-2001 [S]. New York: IEEE Press, 2001.
    • IEEE Standard for Local and Metropolitan Area Networks. Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std 802-2001 [S]. New York: IEEE Press, 2001.
  • 3
    • 33947584918 scopus 로고    scopus 로고
    • IEEE Standard for Local and Metropolitan Area Networks. Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std 802.16-2004 [S]. New York: IEEE Press, 2004.
    • IEEE Standard for Local and Metropolitan Area Networks. Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std 802.16-2004 [S]. New York: IEEE Press, 2004.
  • 4
    • 3042685819 scopus 로고    scopus 로고
    • Overview of IEEE 802.16 Security [J]
    • David J, Jesse W. Overview of IEEE 802.16 Security [J]. IEEE Security and Privacy, 2004, 2(3): 40-48.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 40-48
    • David, J.1    Jesse, W.2
  • 5
    • 33947595264 scopus 로고    scopus 로고
    • Jagannath V M D. Wireless Security-802.16[EB/OL]. [2006-01-10].http:// www.cse.iitk.ac.in/~dheeraj/reports/security-802.16.pdf
    • Jagannath V M D. Wireless Security-802.16[EB/OL]. [2006-01-10].http:// www.cse.iitk.ac.in/~dheeraj/reports/security-802.16.pdf
  • 6
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Schroeder Public Key Protocol Using FDR[C]//
    • Proceedings of TACAS, Berlin: Springer-Verlag
    • Gavin L. Breaking and Fixing the Needham-Schroeder Public Key Protocol Using FDR[C]// Proceedings of TACAS, LNCS1055. Berlin: Springer-Verlag, 1996: 147-166.
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Gavin, L.1
  • 7
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels[C]// EUROCRYPT'01
    • Berlin: Springer-Verlag
    • Ran C, Hugo K. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels[C]// EUROCRYPT'01, LNCS 2045. Berlin: Springer-Verlag. 2001:453-474.
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Ran, C.1    Hugo, K.2
  • 8
    • 33947595025 scopus 로고    scopus 로고
    • DOCSIS. Baseline Privacy Plus Interface Specification, SP-BPI+[EB/OL].[2005-03-19].http://www.cablemodem.com/specifications/ specifications20.html.
    • DOCSIS. Baseline Privacy Plus Interface Specification, SP-BPI+[EB/OL].[2005-03-19].http://www.cablemodem.com/specifications/ specifications20.html.
  • 9
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution[C]// CRYPTO'93
    • Berlin: Springer-Verlag
    • Mihir B, Phillip R. Entity Authentication and Key Distribution[C]// CRYPTO'93, LNCS 773. Berlin: Springer-Verlag, 1994: 232-249.
    • (1994) LNCS , vol.773 , pp. 232-249
    • Mihir, B.1    Phillip, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.