-
1
-
-
34447539028
-
-
Aboba B, Simon D, PPP EAP TLS authentication protocol. RFC 2716; October 1999.
-
-
-
-
2
-
-
34447545227
-
-
Anderson H, Josefsson S. Protected EAP protocol (PEAP). draft-josefsson-pppext-eap-tls-eap-07.txt. internet draft (work in progress); November 2003.
-
-
-
-
3
-
-
34447508989
-
-
Springer-Verlag, Cambridge, UK
-
Asokan N., Niemi V., and Nyberg K. "Man-in-the-middle in tunneled authentication protocols", in the 11th security protocols workshop (April 2003), Springer-Verlag, Cambridge, UK
-
(2003)
"Man-in-the-middle in tunneled authentication protocols", in the 11th security protocols workshop
-
-
Asokan, N.1
Niemi, V.2
Nyberg, K.3
-
4
-
-
34447559188
-
-
Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H. Extensible Authentication Protocol (EAP), RFC 3748; June 2004.
-
-
-
-
6
-
-
34447522751
-
-
Blunk L, Vollbrecht J. PPP extensible authentication protocol (EAP). RFC 2284; March 1998.
-
-
-
-
8
-
-
34447537489
-
-
Bersani F, Tschofenig H. The EAP-PSK protocol: a pres-shared key EAP method. draft-bersani-eap-psk-07.txt; February 2005.
-
-
-
-
9
-
-
34447510742
-
-
Cam-Winget N, McGrew D, Salowey J, et al. EAP flexible authentication via secure tunneling (EAP-FAST). Internet draft; April 2005.
-
-
-
-
10
-
-
34447560693
-
-
Dierks T, Allen C. The TLS protocol version 1.0. RFC 2246; January 1999.
-
-
-
-
11
-
-
84883889985
-
-
Engelstad P, Haslestad T, Paint F. Authenticated access for IPv6 supported mobility. In: Proceedings of the eighth IEEE International Symposium on Computers and Communication (ISCC '03); 2003.
-
-
-
-
12
-
-
34447522752
-
-
Falk M, Fast and secure roaming in WLAN. final thesis; Department of Computer and Information Science; December 2004.
-
-
-
-
13
-
-
34447516732
-
-
Fluhrer SR, Mantin I, Shamir A. Weaknesses in the key scheduling algorithm of RC4. In: Eighth annual workshop on selected Areas in cryptography; August 2001.
-
-
-
-
14
-
-
34447537490
-
-
Funk P, Blake-Wilson S. EAP tunneled TLS authentication protocol (EAP-TTLS). draft-ietf-pppext-eap-ttls-05.txt; July 2004.
-
-
-
-
16
-
-
34447531558
-
-
He, CH, Mitchell, JC. Security analysis and improvements for IEEE 802.11i. Whitepaper; 2005.
-
-
-
-
17
-
-
34447539354
-
-
Housley R, Polk W, Ford W, Solo D. Internet X. 509 public key infrastructure certificate and CRL profile. RFC 3280; April 2002.
-
-
-
-
18
-
-
11244278744
-
-
He CH, Mitchell JC. Analysis of the 802.11i 4-way handshake. In: Proceedings of the 2004 ACM workshop on wireless security; 2004. p. 43-50.
-
-
-
-
19
-
-
34447539353
-
-
IEEE Std 802.1X. Port-based network access control; 2001.
-
-
-
-
20
-
-
34447559187
-
-
IEEE standards for local and metropolitan area networks: port based network access control, IEEE Std 802.1X-2004; December 2004.
-
-
-
-
21
-
-
34447510741
-
-
Interlink Network. EAP methods for wireless authentication; April 2003.
-
-
-
-
22
-
-
34447531557
-
-
Jablon, Strong password-only authenticated key exchange. draft-jablon-speke-00.txt; March 1997.
-
-
-
-
23
-
-
34447537488
-
-
Johnson D, Perkins C, Arkko J. Mobility support in IPv6. RFC 3775; June 2004 [IETF].
-
-
-
-
24
-
-
34447521214
-
-
Otto T, Tschofenig H. The EAP-TLS-PSK authentication protocol. draft-otto-emu-eap-tls-psk-00, internet draft; April 2006.
-
-
-
-
25
-
-
34447507425
-
-
Prasad,AR, Schoo P. IP security for beyond 3G towards 4G. In: Proceedings of WWRF 7, Eindhoven, Netherlands; December 2002.
-
-
-
-
26
-
-
34447524622
-
-
Rigney C, Willens S, Rubens A. Remote Authentication Dial In User Service (RADIUS). RFC 2865; June 2000.
-
-
-
-
27
-
-
34447560692
-
-
Stanley D, Walker J, Aboba B. Extensible authentication protocol (EAP) method requirements for wireless LANs. RFC 4017; March 2005.
-
-
-
-
28
-
-
0003477171
-
-
AT&T Labs Research [TR TD-4ZCPZZ]
-
Stubblefield A., Ioannidis J., and Rubin A.D. Using the Fluhrer, Mantin, and Shamir attack to break WEP (August 2001), AT&T Labs Research [TR TD-4ZCPZZ]
-
(2001)
Using the Fluhrer, Mantin, and Shamir attack to break WEP
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.D.3
-
30
-
-
34447507240
-
-
Wi-Fi Alliance. Deploying Wi-Fi Protected Access (WPATM) and WPA2TM in the enterprise; March 2005.
-
-
-
-
31
-
-
34447533088
-
-
WiMAX Forum. WiMAX end-to-end network systems architecture - stage 2: architecture tenets, reference model and reference points; December 2005.
-
-
-
-
32
-
-
34447507424
-
-
Wan Z, Deng, RH, Bao E, Ananda AL. DoS-resistant access control protocol with identity confidentiality for wireless networks. In: WCNC '05; 13-17 March 2005, New Orleans, LA, USA.
-
-
-
-
33
-
-
34447503048
-
-
Zhang Wenhui. Interworking security in heterogeneous wireless ip networks. In: Proceedings of third international conference on networking (ICN '04), Guadeloupe; 2004.
-
-
-
|