메뉴 건너뛰기




Volumn , Issue , 2008, Pages 36-45

Wireless client puzzles in IEEE 802.11 networks: Security by wireless

Author keywords

Client puzzles; Denial of service (DoS); Impersonation attacks; Wireless security

Indexed keywords

IMPACT STRENGTH; INTERNET; NETWORK SECURITY; STANDARDS; TELECOMMUNICATION NETWORKS;

EID: 52049085664     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352533.1352541     Document Type: Conference Paper
Times cited : (22)

References (19)
  • 9
    • 84861587712 scopus 로고    scopus 로고
    • Client Puzzles: A Cryptographic Countermeasure against Connection Depletion Attacks
    • IEEE Computer Society, February
    • A. Juels and J. Brainard. Client Puzzles: A Cryptographic Countermeasure against Connection Depletion Attacks. In Proceedings of the Network and Distributed Security Systems (NDSS'99), pages 151-165. IEEE Computer Society, February 1999.
    • (1999) Proceedings of the Network and Distributed Security Systems (NDSS'99 , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 10
    • 0038479936 scopus 로고    scopus 로고
    • Public-key based Authentication and Key Establishment Protocol coupled with a Client Puzzle
    • M. C. Lee and Chun-Kan Fung. A Public-key based Authentication and Key Establishment Protocol coupled with a Client Puzzle. J. Am. Soc. Inf. Sci. Technol., 54(9):810-823, 2003.
    • (2003) J. Am. Soc. Inf. Sci. Technol , vol.54 , Issue.9 , pp. 810-823
    • Lee, M.C.1    Chun-Kan Fung, A.2
  • 15
    • 56749105286 scopus 로고    scopus 로고
    • A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. 2002. Cryptobytes, 5, No. 2 RSA Laboratories, pages 2-13. Available at www.rsa.com/rsalabs/cryptobytes/cryptobytes-v5n2.pdf.
    • A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. 2002. Cryptobytes, Volume 5, No. 2 (RSA Laboratories, pages 2-13. Available at www.rsa.com/rsalabs/cryptobytes/cryptobytes-v5n2.pdf.
  • 18
    • 33751031293 scopus 로고    scopus 로고
    • M. Čagalj, S. Čapkun, R. Rengaswamy, I. Tsigkogiannis, M. Srivastava, and J.-P. Hubaux. Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pages 280-294, May 2006.
    • M. Čagalj, S. Čapkun, R. Rengaswamy, I. Tsigkogiannis, M. Srivastava, and J.-P. Hubaux. Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pages 280-294, May 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.