메뉴 건너뛰기




Volumn 8, Issue 9, 2016, Pages

Sustainable and practical firmware upgrade for wireless access point using password-based authentication

Author keywords

Password based authentication; Practical firmware upgrade; Sustainable wireless access points

Indexed keywords

DATA ACQUISITION; ELECTRONIC EQUIPMENT; EXPERIMENTAL STUDY; HARDWARE; INTERNET; RESOURCE USE; VULNERABILITY;

EID: 84990923771     PISSN: None     EISSN: 20711050     Source Type: Journal    
DOI: 10.3390/su8090876     Document Type: Article
Times cited : (4)

References (41)
  • 4
    • 84928553068 scopus 로고    scopus 로고
    • Penetration Testing and Network Auditing: Linux
    • Stiawan, D.; Idris, M.Y.; Abdullah, A.H. Penetration Testing and Network Auditing: Linux. JIPS 2015, 11, 104-115.
    • (2015) JIPS , vol.11 , pp. 104-115
    • Stiawan, D.1    Idris, M.Y.2    Abdullah, A.H.3
  • 7
    • 84910621255 scopus 로고    scopus 로고
    • (accessed on 23 August 2016)
    • Miller, C. Battery Firmware Hacking. Available online: http://www.hakim.ws/BHUS2011/materials/Miller/BH_US_11_Miller_Battery_Firmware_Public_WP.pdf (accessed on 23 August 2016).
    • Battery Firmware Hacking
    • Miller, C.1
  • 8
    • 84964317984 scopus 로고    scopus 로고
    • Secure firmware validation and update for consumer devices in home networking
    • Choi, B.C.; Lee, S.H.; Na, J.C.; Lee, J.H. Secure firmware validation and update for consumer devices in home networking. IEEE Trans. Consum. Electron. 2016, 62, 39-44.
    • (2016) IEEE Trans. Consum. Electron , vol.62 , pp. 39-44
    • Choi, B.C.1    Lee, S.H.2    Na, J.C.3    Lee, J.H.4
  • 10
    • 84865586926 scopus 로고    scopus 로고
    • Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties
    • Springer: Berlin, Germany
    • Dacosta, I.; Ahamad, M.; Traynor, P. Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties. In Computer Security-ESORICS 2012; Springer: Berlin, Germany, 2012; pp. 199-216.
    • (2012) Computer Security-ESORICS 2012 , pp. 199-216
    • Dacosta, I.1    Ahamad, M.2    Traynor, P.3
  • 23
    • 84924540364 scopus 로고    scopus 로고
    • Analyzis of covert hardware attacks
    • Moein, S.; Gebali, F.; Traore, I. Analyzis of covert hardware attacks. J. Converg. 2014, 5, 26-30.
    • (2014) J. Converg , vol.5 , pp. 26-30
    • Moein, S.1    Gebali, F.2    Traore, I.3
  • 25
    • 31344439511 scopus 로고    scopus 로고
    • (accessed on 23 August 2016)
    • Burkholder, P. SSL Man-in-the-Middle Attacks. Available online: http://www.windowsecurity.com/articlestutorials/authentication_and_encryption/Understanding-Man-in-the-Middle-Attacks-ARP-Part4.html (accessed on 23 August 2016).
    • SSL Man-in-the-Middle Attacks
    • Burkholder, P.1
  • 26
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public key infrastructure
    • Ellison, C.; Schneier, B. Ten risks of PKI: What you're not being told about public key infrastructure. Comput. Secur. J. 2000, 16, 1-7.
    • (2000) Comput. Secur. J , vol.16 , pp. 1-7
    • Ellison, C.1    Schneier, B.2
  • 27
    • 84950291360 scopus 로고    scopus 로고
    • How does this message make you feel? A study of user perspectives on software update/warning message design
    • Fagan, M.; Khan, M.M.H.; Nguyen, N. How does this message make you feel? A study of user perspectives on software update/warning message design. Hum. Centric Comput. Inf. Sci. 2015, 5, 1-26.
    • (2015) Hum. Centric Comput. Inf. Sci , vol.5 , pp. 1-26
    • Fagan, M.1    Khan, M.M.H.2    Nguyen, N.3
  • 30
    • 84990919879 scopus 로고    scopus 로고
    • (accessed on 23 August 2016)
    • Top 20 RatedWireless Access Points Reviews 2016. Available online: https://www.vbestreviews.com/top-10-rated-wireless-access-point-reviews-2015/(accessed on 23 August 2016).
  • 31
    • 84991025437 scopus 로고    scopus 로고
    • 197: The official AES standard. Figure 2: Working scheme with four LFSRs and their IV generation LFSR1
    • FIPS. 197: The official AES standard. Figure 2: Working scheme with four LFSRs and their IV generation LFSR1. LFSR 2001, 2, 1-3.
    • (2001) LFSR , vol.2 , pp. 1-3
  • 32
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Barbara, CA, USA, 22-26 August 1993; Springer: Berlin, Germany
    • Bellare, M.; Rogaway, P. Entity Authentication and Key Distribution. In Proceedings of the Annual International Cryptology Conference, Barbara, CA, USA, 22-26 August 1993; Springer: Berlin, Germany, 1993; pp. 232-249.
    • (1993) Proceedings of the Annual International Cryptology Conference , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 35
    • 0032069870 scopus 로고    scopus 로고
    • Key control in key agreement protocols
    • Mitchell, C.J.; Ward, M.; Wilson, P. Key control in key agreement protocols. Electron. Lett. 1998, 34, 980-981.
    • (1998) Electron. Lett , vol.34 , pp. 980-981
    • Mitchell, C.J.1    Ward, M.2    Wilson, P.3
  • 36
    • 84868107460 scopus 로고    scopus 로고
    • A Privacy Preserving Application Acquisition Protocol
    • Security and Privacy in Computing and Communications, Liverpool, UK, 25-27 June
    • Akram, R.N.; Markantonakis, K.; Mayes, K. A Privacy Preserving Application Acquisition Protocol. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25-27 June 2012; pp. 383-392.
    • (2012) Proceedings of the 2012 IEEE 11th International Conference on Trust , pp. 383-392
    • Akram, R.N.1    Markantonakis, K.2    Mayes, K.3
  • 41
    • 84865579512 scopus 로고    scopus 로고
    • X.509 Forensics: Detecting and Localizing the SSL/TLS Men-in-the-Middle
    • Springer: Berlin, Germany
    • Holz, R.; Riedmaier, T.; Kammenhuber, N.; Carle, G. X.509 Forensics: Detecting and Localizing the SSL/TLS Men-in-the-Middle. In Computer Security-Esorics 2012; Springer: Berlin, Germany, 2012; pp. 217-234.
    • (2012) Computer Security-Esorics 2012 , pp. 217-234
    • Holz, R.1    Riedmaier, T.2    Kammenhuber, N.3    Carle, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.