메뉴 건너뛰기




Volumn 54, Issue 15, 2010, Pages 2651-2673

Secure three-party key distribution protocol for fast network access in EAP-based wireless networks

Author keywords

EAP; Fast handoff; Fast re authentication; Key distribution; Network security

Indexed keywords

AUTHENTICATION ARCHITECTURE; DIFFERENT DOMAINS; EAP; EXTENSIBLE AUTHENTICATION PROTOCOLS; EXTENSIVE SIMULATIONS; FAST HANDOFF; FAST RE-AUTHENTICATION; FORMAL TOOLS; INTER-DOMAIN; INTRA-DOMAIN; KEY DISTRIBUTION; KEY-DISTRIBUTION PROTOCOLS; MESSAGE EXCHANGE; MOBILE NETWORKS; MOBILE USERS; MULTI DOMAINS; NETWORK ACCESS; NETWORK ACCESS CONTROL; PERFORMANCE BENEFITS; SECURE KEY DISTRIBUTION; SMOOTH HANDOFF; THREE-PARTY; TIME SPENT;

EID: 77956877430     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2010.04.014     Document Type: Article
Times cited : (8)

References (57)
  • 1
    • 38349039255 scopus 로고    scopus 로고
    • 3-Party approach for fast handover in EAP-based wireless networks
    • Vilamoura, Portugal
    • R. Marin, P.J. Fernandez, A.F. Gomez, 3-Party approach for fast handover in EAP-based wireless networks, in: On the Move (OTM) Conferences, IS 2007, LNCS, vol. 4804, Vilamoura, Portugal, 2007, pp. 1734-1751.
    • (2007) On the Move (OTM) Conferences, IS 2007, LNCS , vol.4804 , pp. 1734-1751
    • Marin, R.1    Fernandez, P.J.2    Gomez, A.F.3
  • 14
    • 26444442332 scopus 로고    scopus 로고
    • Security requirements for key establishment proof models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee protocols
    • Brisbane, Australia, Springer-Verlag
    • K.R. Choo, Y. Hitchock, Security requirements for key establishment proof models: revisiting Bellare-Rogaway and Jeong-Katz-Lee protocols, in: Proceedings of 10th Australasian Conference, ACISP 2005, Brisbane, Australia, Springer-Verlag, 2005, pp. 429-442.
    • (2005) Proceedings of 10th Australasian Conference, ACISP 2005 , pp. 429-442
    • Choo, K.R.1    Hitchock, Y.2
  • 18
    • 21244475556 scopus 로고    scopus 로고
    • Service Level Agreement in IP Networks
    • D. Verma Service Level Agreement in IP Networks Proceedings of IEEE 92 2004 1382 1388
    • (2004) Proceedings of IEEE , vol.92 , pp. 1382-1388
    • Verma, D.1
  • 24
    • 33646227667 scopus 로고    scopus 로고
    • Automated security protocol analysis with the AVISPA tool
    • L. Vigan Automated security protocol analysis with the AVISPA tool Electric Notes in Theoretical Computer Science 155 2006 61 86
    • (2006) Electric Notes in Theoretical Computer Science , vol.155 , pp. 61-86
    • Vigan, L.1
  • 34
    • 26444497860 scopus 로고    scopus 로고
    • The AVISPA tool for the automated validation of internet security protocols and applications
    • Edinburgh, Scotland, UK, Springer-Verlag
    • A. Armando et al., The AVISPA tool for the automated validation of internet security protocols and applications, in: Proceedings of the 17th International Conference on Computer-Aided Verification, LNCS, vol. 3576, Edinburgh, Scotland, UK, Springer-Verlag, 2005, pp. 281-285.
    • (2005) Proceedings of the 17th International Conference on Computer-Aided Verification, LNCS , vol.3576 , pp. 281-285
    • Armando, A.1
  • 38
    • 11244325366 scopus 로고    scopus 로고
    • Fast inter-AP handoff using predictive-authentication scheme in a public wireless LAN
    • Joint ICN 2002 and ICWLHN 2002
    • S. Pack, Y. Choi, Fast inter-AP handoff using predictive-authentication scheme in a public wireless LAN, in: Proceedings of IEEE Networks 2002 (Joint ICN 2002 and ICWLHN 2002), 2002.
    • (2002) Proceedings of IEEE Networks 2002
    • Pack, S.1    Choi, Y.2
  • 43
    • 33746068613 scopus 로고    scopus 로고
    • A provable-security treatment of the key-wrap problem
    • Phillip Rogaway, Thomas Shrimpton, A provable-security treatment of the key-wrap problem, in: EUROCRYPT, 2006, pp. 373-390.
    • (2006) EUROCRYPT , pp. 373-390
    • Rogaway, P.1    Shrimpton, T.2
  • 47
    • 0028397595 scopus 로고
    • Authentication of mobile users
    • R. Molva, D. Samfat, and G. Tsudik Authentication of mobile users IEEE Networks 8 2 1994 26 35
    • (1994) IEEE Networks , vol.8 , Issue.2 , pp. 26-35
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 49
    • 33646838180 scopus 로고    scopus 로고
    • Authentication in fast handover of mobile IPv6 applying AAA by using hash value
    • 2005
    • H. Kang, Y. Mung, Authentication in fast handover of mobile IPv6 applying AAA by using hash value, LNCS, vol. 3794/2005, 2005, pp. 815-824.
    • (2005) LNCS , vol.3794 , pp. 815-824
    • Kang, H.1    Mung, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.