메뉴 건너뛰기




Volumn , Issue , 2007, Pages 391-402

Securing network location awareness with authenticated DHCP

Author keywords

[No Author keywords available]

Indexed keywords

LOCATION; MECHANISMS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; PERSONAL COMMUNICATION SYSTEMS; SERVERS; TELECOMMUNICATION NETWORKS; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 50249147910     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECCOM.2007.4550359     Document Type: Conference Paper
Times cited : (12)

References (21)
  • 1
    • 51349168429 scopus 로고    scopus 로고
    • Jari Arkko, Pasi Eronen, Hannes Tschofenig, Seppo Heikkinen, and Anand Prasad. Quick NAP-secure and efficient network access protocol. In Proc, 6th International Workshop on Applications and Services in Wireless Networks (ASWN 2006), pages 163-170, Berlin, Germany, May 2006.
    • Jari Arkko, Pasi Eronen, Hannes Tschofenig, Seppo Heikkinen, and Anand Prasad. Quick NAP-secure and efficient network access protocol. In Proc, 6th International Workshop on Applications and Services in Wireless Networks (ASWN 2006), pages 163-170, Berlin, Germany, May 2006.
  • 2
    • 35248872561 scopus 로고    scopus 로고
    • Cryptographically generated addresses (CGA)
    • Proc. 6th Information Security Conference ISC03, of, Bristol, UK, October, Springer
    • Tuomas Aura. Cryptographically generated addresses (CGA). In Proc. 6th Information Security Conference (ISC03), volume 2851 of LNCS, pages 29-43, Bristol, UK, October 2003. Springer.
    • (2003) LNCS , vol.2851 , pp. 29-43
    • Aura, T.1
  • 3
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, February 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 4
    • 3142582567 scopus 로고    scopus 로고
    • IPv6 opportunistic encryption
    • Technical Report 4568, INRIA, October
    • Claude Castelluccia and Gabriel Montenegro. IPv6 opportunistic encryption. Technical Report 4568, INRIA, October 2002.
    • (2002)
    • Castelluccia, C.1    Montenegro, G.2
  • 5
    • 1542341270 scopus 로고    scopus 로고
    • Location-based authentication: Grounding cyberspace for better security
    • February
    • Dorothy E. Denning and Peter F. MacDoran. Location-based authentication: Grounding cyberspace for better security. Elsevier Computer Fraud & Security, pages 12-16, February 1996.
    • (1996) Elsevier Computer Fraud & Security , pp. 12-16
    • Denning, D.E.1    MacDoran, P.F.2
  • 6
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • August
    • D. Dolev and A. Yao. On the security of public-key protocols. Communications of the ACM, 29(8):198-208, August 1983.
    • (1983) Communications of the ACM , vol.29 , Issue.8 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 7
    • 0003828189 scopus 로고    scopus 로고
    • Dynamic host configuration protocol. RFC 2131
    • March
    • Ralph Droms. Dynamic host configuration protocol. RFC 2131, IETF, March 1997.
    • (1997) IETF
    • Droms, R.1
  • 8
    • 48649088135 scopus 로고    scopus 로고
    • Authentication for DHCP messages. RFC 3118
    • June
    • Ralph Droms and Bill Arbaugh. Authentication for DHCP messages. RFC 3118, IETF, June 2001.
    • (2001) IETF
    • Droms, R.1    Arbaugh, B.2
  • 9
    • 51349117522 scopus 로고    scopus 로고
    • Dynamic host configuration protocol for IPv6 (DHCPv6). RFC 3315
    • July
    • Ralph Droms, Jim Bound, Bernie Volz, Ted Lemon, Charles E. Perkins, and Mike Carney. Dynamic host configuration protocol for IPv6 (DHCPv6). RFC 3315, IETF, July 2003.
    • (2003) IETF
    • Droms, R.1    Bound, J.2    Volz, B.3    Lemon, T.4    Perkins, C.E.5    Carney, M.6
  • 10
    • 51349106094 scopus 로고    scopus 로고
    • Jon Edney and William A. Arbaugh. Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley, 2003.
    • Jon Edney and William A. Arbaugh. Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley, 2003.
  • 12
    • 33847329743 scopus 로고    scopus 로고
    • An RFID distance bounding protocol
    • Athens, Greece, September, IEEE Communications Society
    • Gerhard P. Hancke and Markus G. Kuhn. An RFID distance bounding protocol. In Proc. IEEE SecureComm 2005, Athens, Greece, September 2005. IEEE Communications Society.
    • (2005) Proc. IEEE SecureComm
    • Hancke, G.P.1    Kuhn, M.G.2
  • 13
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • April
    • Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In Proc. IEEE Infocomm 2003, April 2003.
    • (2003) In Proc. IEEE Infocomm 2003
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 14
    • 51349150095 scopus 로고    scopus 로고
    • International Telecommunication Union. ITU-T recommendation X.509 (1997 E): Information technology-open systems interconnection-the director): Authentication framework, June 1997.
    • International Telecommunication Union. ITU-T recommendation X.509 (1997 E): Information technology-open systems interconnection-the director): Authentication framework, June 1997.
  • 15
    • 35048826237 scopus 로고    scopus 로고
    • Markus G. Kuhn. An asymmetric security mechanism for navigation signals. In Proc. 6th International Workshop on Information Hiding, 3200 of LNCS, pages 239-252, Toronto, Canada, May 2004. Springer.
    • Markus G. Kuhn. An asymmetric security mechanism for navigation signals. In Proc. 6th International Workshop on Information Hiding, volume 3200 of LNCS, pages 239-252, Toronto, Canada, May 2004. Springer.
  • 16
  • 18
    • 0013091390 scopus 로고    scopus 로고
    • Privacy extensions for stateless address autoconfiguration in IPv6. RFC 3041, IETF Network Working Group
    • January
    • Thomas Narten and Richard Draves. Privacy extensions for stateless address autoconfiguration in IPv6. RFC 3041, IETF Network Working Group, January 2001.
    • (2001)
    • Narten, T.1    Draves, R.2
  • 20
    • 0030676973 scopus 로고    scopus 로고
    • Paul F. Syverson, David M. Goldschlag, and Michael G. Reed. Anonymous connections and onion routing. In Proc. 1997 IEEE Symposium on Security and Privacy, pages 44-54, Oakland, CA USA, May 1997. IEEE Computer Society Press.
    • Paul F. Syverson, David M. Goldschlag, and Michael G. Reed. Anonymous connections and onion routing. In Proc. 1997 IEEE Symposium on Security and Privacy, pages 44-54, Oakland, CA USA, May 1997. IEEE Computer Society Press.
  • 21
    • 85084164692 scopus 로고    scopus 로고
    • SSH-secure login connections over the Internet
    • San Jose, CA USA, July, USENIX Association
    • Tatu Ylönen. SSH-secure login connections over the Internet. In Proc. 6th USENIX Security Symposium, pages 37-42, San Jose, CA USA, July 1996. USENIX Association.
    • (1996) Proc. 6th USENIX Security Symposium , pp. 37-42
    • Ylönen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.