메뉴 건너뛰기




Volumn 8976, Issue , 2015, Pages 245-260

On vulnerabilities of the security association in the IEEE 802.15.6 standard

Author keywords

Attacks; Authenticated key exchange; Cryptographic protocols; Elliptic curves; Wearable security

Indexed keywords

CONSUMER ELECTRONICS; CRYPTOGRAPHY; ELECTRONIC MONEY; GEOMETRY; NETWORKS (CIRCUITS); WEARABLE TECHNOLOGY;

EID: 84950245997     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-48051-9_18     Document Type: Conference Paper
Times cited : (37)

References (14)
  • 3
    • 84950277156 scopus 로고    scopus 로고
    • 15. 6-2012 Standard for Wireless Body Area Networks
    • Association, T. I. S.: IEEE P802. 15. 6-2012 Standard for Wireless Body Area Networks (2012). http://standards. ieee. org/findstds/standard/802. 15. 6-2012. html.
    • (2012) IEEE P802
  • 4
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A high-performance secure diffie-hellman protocol
    • Shoup, V. (ed.),. Springer, Heidelberg
    • Krawczyk, H.: HMQV: a high-performance secure diffie-hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005).
    • (2005) CRYPTO 2005. LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 5
    • 70349692414 scopus 로고    scopus 로고
    • Another look at HMQV
    • Menezes, A.: Another look at HMQV. Math. Cryptology JMC 1(1), 47-64 (2007).
    • (2007) Math. Cryptology JMC , vol.1 , Issue.1 , pp. 47-64
    • Menezes, A.1
  • 7
    • 84921467128 scopus 로고    scopus 로고
    • Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy
    • Toorani, M.: Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy. Secur. Commun. Netw. 8(4), 694-701 (2015).
    • (2015) Secur. Commun. Netw , vol.8 , Issue.4 , pp. 694-701
    • Toorani, M.1
  • 8
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Preneel, B. (ed.),. Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000).
    • (2000) EUROCRYPT 2000. LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 11
    • 84950256432 scopus 로고    scopus 로고
    • Design and implementation analysis of a public key infrastructure-enabled security framework for ZigBee sensor networks
    • Misra, S., Goswami, S., Taneja, C., Mukherjee, A.: Design and implementation analysis of a public key infrastructure-enabled security framework for ZigBee sensor networks. International Journal of Communication Systems (2014).
    • (2014) International Journal of Communication Systems
    • Misra, S.1    Goswami, S.2    Taneja, C.3    Mukherjee, A.4
  • 12
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • Susilo, W., Liu, J.K., Mu, Y. (eds.),. Springer, Heidelberg
    • LaMacchia, B. A., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J. K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007).
    • (2007) ProvSec 2007. LNCS , vol.4784 , pp. 1-16
    • LaMacchia, B.A.1    Lauter, K.2    Mityagin, A.3
  • 13
    • 79959951878 scopus 로고    scopus 로고
    • Cryptanalysis of an elliptic curve-based signcryption scheme
    • Toorani, M., Beheshti, A.: Cryptanalysis of an elliptic curve-based signcryption scheme. Int. J. Netw. Secur. 10(1), 51-56 (2010).
    • (2010) Int. J. Netw. Secur , vol.10 , Issue.1 , pp. 51-56
    • Toorani, M.1    Beheshti, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.