-
1
-
-
51749104577
-
-
IEEE Standard 802.11-2007. Local and metropolitan area networks - specific requirements - part 11: Wireless LAN medium access control and physical layer specifications, 2007.
-
IEEE Standard 802.11-2007. Local and metropolitan area networks - specific requirements - part 11: Wireless LAN medium access control and physical layer specifications, 2007.
-
-
-
-
2
-
-
84945119254
-
Entity authentication and key distribution
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO, pages 232-249, 1993.
-
(1993)
CRYPTO
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
13244299564
-
-
EAP, draft-ietf- eaprfc2284bis-09
-
L. Blunk, J. Vollbrecht, B. Aboba, J. Carlson, and H. Levkowetz. Extensible authentication protocol (EAP). http://tools.ietf.org/html/draft-ietf- eaprfc2284bis-09, 2004.
-
(2004)
Extensible authentication protocol
-
-
Blunk, L.1
Vollbrecht, J.2
Aboba, B.3
Carlson, J.4
Levkowetz, H.5
-
7
-
-
51749125194
-
-
T. Braskich and S. Emeott. Mesh key holder protocol improvements. https://mentor.ieee.org/802.11/documents doc 11-07/1987r1, June 27 2007.
-
T. Braskich and S. Emeott. Mesh key holder protocol improvements. https://mentor.ieee.org/802.11/documents doc 11-07/1987r1, June 27 2007.
-
-
-
-
9
-
-
51749088029
-
-
T. Braskich, S. Emeott, and D. Kuhlman. Security requirements for an abbreviated MSA handshake. https://mentor.ieee.org/802.11/documents doc 11-07/0770r0, May 15 2007.
-
T. Braskich, S. Emeott, and D. Kuhlman. Security requirements for an abbreviated MSA handshake. https://mentor.ieee.org/802.11/documents doc 11-07/0770r0, May 15 2007.
-
-
-
-
11
-
-
33947704230
-
Computationally sound compositional logic for key exchange protocols
-
A. Datta, A. Derek, J.C. Mitchell, and B. Warinschi. Computationally sound compositional logic for key exchange protocols. In Proceedings of 19th IEEE Computer Security Foundations Workshop, pages 321-334, 2006.
-
(2006)
Proceedings of 19th IEEE Computer Security Foundations Workshop
, pp. 321-334
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Warinschi, B.4
-
12
-
-
34548864135
-
A derivation system for security protocols and its logical formalization
-
A. Datta, A. Derek, J. Mitchell, and D. Pavlovic. A derivation system for security protocols and its logical formalization. In 16th IEEE Computer Security FoundationsWorkshop (CWFW-16), pages 109-125, 2003.
-
(2003)
16th IEEE Computer Security FoundationsWorkshop (CWFW-16)
, pp. 109-125
-
-
Datta, A.1
Derek, A.2
Mitchell, J.3
Pavlovic, D.4
-
13
-
-
2642548302
-
Secure protocol composition
-
A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic. Secure protocol composition. In FMSE, pages 11-23, 2003.
-
(2003)
FMSE
, pp. 11-23
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
14
-
-
24144442872
-
A derivation system and compositional logic for security protocols
-
A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic. A derivation system and compositional logic for security protocols. J. Comput. Secur., 13(3):423-482, 2005.
-
(2005)
J. Comput. Secur
, vol.13
, Issue.3
, pp. 423-482
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
15
-
-
33847655213
-
Protocol composition logic (PCL)
-
A. Datta, A. Derek, J. C. Mitchell, and A. Roy. Protocol composition logic (PCL). Electr. Notes Theor. Comput. Sci., 172:311-358, 2007.
-
(2007)
Electr. Notes Theor. Comput. Sci
, vol.172
, pp. 311-358
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Roy, A.4
-
16
-
-
51749085255
-
-
A. Datta, A. Derek, J. C. Mitchell, and B. Warinschi. Key exchange protocols: Security definition, proof method and applications
-
A. Datta, A. Derek, J. C. Mitchell, and B. Warinschi. Key exchange protocols: Security definition, proof method and applications.
-
-
-
-
17
-
-
51749121680
-
-
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol, version 1.1, RFC 4346, April 2006
-
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol, version 1.1 - RFC 4346. http://tools.ietf.org/html/rfc4346, April 2006.
-
-
-
-
18
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Des. Codes Cryptography, 2(2):107-125, 1992.
-
(1992)
Des. Codes Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
20
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
N. Durgin, J. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. J. Comput. Secur., 11(4):677-721, 2004.
-
(2004)
J. Comput. Secur
, vol.11
, Issue.4
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.2
Pavlovic, D.3
-
21
-
-
0029713154
-
What do we mean by entity authentication?
-
Washington, DC, USA, IEEE Computer Society
-
D. Gollmann. What do we mean by entity authentication? In SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy, page 46, Washington, DC, USA, 1996. IEEE Computer Society.
-
(1996)
SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 46
-
-
Gollmann, D.1
-
23
-
-
33745770376
-
A modular correctness proof of IEEE 802.11i and TLS
-
C. He, M. Sundararajan, A. Datta, A. Derek, and J. C. Mitchell. A modular correctness proof of IEEE 802.11i and TLS. In ACM Conference on Computer and Communications Security, pages 2-15, 2005.
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 2-15
-
-
He, C.1
Sundararajan, M.2
Datta, A.3
Derek, A.4
Mitchell, J.C.5
-
24
-
-
35248816546
-
SIGMA: The 'SIGn-and-MAc' approach to authenticated diffie-hellman and its use in the IKE-protocols
-
H. Krawczyk. SIGMA: The 'SIGn-and-MAc' approach to authenticated diffie-hellman and its use in the IKE-protocols. In CRYPTO, pages 400-425, 2003.
-
(2003)
CRYPTO
, pp. 400-425
-
-
Krawczyk, H.1
-
25
-
-
47649101943
-
A proof of security of a mesh security architecture
-
D. Kuhlman, R. Moriarty, T. Braskich, S. Emeott, and M. Tripunitara. A proof of security of a mesh security architecture. http://eprint.iacr.org/2007/ 364.pdf, 2007.
-
(2007)
-
-
Kuhlman, D.1
Moriarty, R.2
Braskich, T.3
Emeott, S.4
Tripunitara, M.5
-
26
-
-
33745772467
-
Deriving, attacking and defending the GDOI protocol
-
C. Meadows and D. Pavlovic. Deriving, attacking and defending the GDOI protocol. In ESORICS, pages 53-72, 2004.
-
(2004)
ESORICS
, pp. 53-72
-
-
Meadows, C.1
Pavlovic, D.2
-
29
-
-
38049090664
-
Secrecy analysis in protocol composition logic
-
A. Roy, A. Datta, A. Derek, J. C. Mitchell, and JP. Seifert. Secrecy analysis in protocol composition logic. In Proceedings of 11th Annual Asian Computing Science Conference, 2006.
-
(2006)
Proceedings of 11th Annual Asian Computing Science Conference
-
-
Roy, A.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
Seifert, J.P.5
-
30
-
-
51749092540
-
Secrecy analysis in protocol composition logic
-
IOS Press
-
A. Roy, A. Datta, A. Derek, J. C. Mitchell, and JP. Seifert. Secrecy analysis in protocol composition logic. In Formal Logical Methods for System Security and Correctness. IOS Press, 2008.
-
(2008)
Formal Logical Methods for System Security and Correctness
-
-
Roy, A.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
Seifert, J.P.5
-
32
-
-
51749096808
-
-
M. Zhao, J. Walker, and W. Steven Conner. Overview of abbreviated handshake protocol. https://mentor.ieee.org/802.11/documents doc 11-07/1998r01, June 14 2007.
-
M. Zhao, J. Walker, and W. Steven Conner. Overview of abbreviated handshake protocol. https://mentor.ieee.org/802.11/documents doc 11-07/1998r01, June 14 2007.
-
-
-
|