메뉴 건너뛰기




Volumn , Issue , 2008, Pages 315-330

A correctness proof of a Mesh Security Architecture

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SECURITY; IEEE 802.11; SECURITY ARCHITECTURES;

EID: 51749117408     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2008.23     Document Type: Conference Paper
Times cited : (12)

References (32)
  • 1
    • 51749104577 scopus 로고    scopus 로고
    • IEEE Standard 802.11-2007. Local and metropolitan area networks - specific requirements - part 11: Wireless LAN medium access control and physical layer specifications, 2007.
    • IEEE Standard 802.11-2007. Local and metropolitan area networks - specific requirements - part 11: Wireless LAN medium access control and physical layer specifications, 2007.
  • 2
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO, pages 232-249, 1993.
    • (1993) CRYPTO , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 51749125194 scopus 로고    scopus 로고
    • T. Braskich and S. Emeott. Mesh key holder protocol improvements. https://mentor.ieee.org/802.11/documents doc 11-07/1987r1, June 27 2007.
    • T. Braskich and S. Emeott. Mesh key holder protocol improvements. https://mentor.ieee.org/802.11/documents doc 11-07/1987r1, June 27 2007.
  • 9
    • 51749088029 scopus 로고    scopus 로고
    • T. Braskich, S. Emeott, and D. Kuhlman. Security requirements for an abbreviated MSA handshake. https://mentor.ieee.org/802.11/documents doc 11-07/0770r0, May 15 2007.
    • T. Braskich, S. Emeott, and D. Kuhlman. Security requirements for an abbreviated MSA handshake. https://mentor.ieee.org/802.11/documents doc 11-07/0770r0, May 15 2007.
  • 14
    • 24144442872 scopus 로고    scopus 로고
    • A derivation system and compositional logic for security protocols
    • A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic. A derivation system and compositional logic for security protocols. J. Comput. Secur., 13(3):423-482, 2005.
    • (2005) J. Comput. Secur , vol.13 , Issue.3 , pp. 423-482
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Pavlovic, D.4
  • 16
    • 51749085255 scopus 로고    scopus 로고
    • A. Datta, A. Derek, J. C. Mitchell, and B. Warinschi. Key exchange protocols: Security definition, proof method and applications
    • A. Datta, A. Derek, J. C. Mitchell, and B. Warinschi. Key exchange protocols: Security definition, proof method and applications.
  • 17
    • 51749121680 scopus 로고    scopus 로고
    • T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol, version 1.1, RFC 4346, April 2006
    • T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol, version 1.1 - RFC 4346. http://tools.ietf.org/html/rfc4346, April 2006.
  • 20
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • N. Durgin, J. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. J. Comput. Secur., 11(4):677-721, 2004.
    • (2004) J. Comput. Secur , vol.11 , Issue.4 , pp. 677-721
    • Durgin, N.1    Mitchell, J.2    Pavlovic, D.3
  • 24
    • 35248816546 scopus 로고    scopus 로고
    • SIGMA: The 'SIGn-and-MAc' approach to authenticated diffie-hellman and its use in the IKE-protocols
    • H. Krawczyk. SIGMA: The 'SIGn-and-MAc' approach to authenticated diffie-hellman and its use in the IKE-protocols. In CRYPTO, pages 400-425, 2003.
    • (2003) CRYPTO , pp. 400-425
    • Krawczyk, H.1
  • 25
  • 26
    • 33745772467 scopus 로고    scopus 로고
    • Deriving, attacking and defending the GDOI protocol
    • C. Meadows and D. Pavlovic. Deriving, attacking and defending the GDOI protocol. In ESORICS, pages 53-72, 2004.
    • (2004) ESORICS , pp. 53-72
    • Meadows, C.1    Pavlovic, D.2
  • 32
    • 51749096808 scopus 로고    scopus 로고
    • M. Zhao, J. Walker, and W. Steven Conner. Overview of abbreviated handshake protocol. https://mentor.ieee.org/802.11/documents doc 11-07/1998r01, June 14 2007.
    • M. Zhao, J. Walker, and W. Steven Conner. Overview of abbreviated handshake protocol. https://mentor.ieee.org/802.11/documents doc 11-07/1998r01, June 14 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.