-
1
-
-
9144257038
-
-
International Telecommunication Union (ITU), http://www.itu.int/home/imt.html.
-
-
-
-
2
-
-
9144257638
-
-
ETSI TS 122 060
-
General Packet Radio Services (GPRS) Service Description (Stage 2), ETSI TS 122 060, 2002.
-
(2002)
Service Description (Stage 2)
-
-
-
4
-
-
0041594241
-
Wireless LAN media access control (MAC) and physical layer (PHY) specifications
-
ISO/IEC 8802-11
-
Wireless LAN media access control (MAC) and physical layer (PHY) specifications, ANSI/IEEE Std. 802.11: 1999 (E) Part 11, ISO/IEC 8802-11, 1999.
-
(1999)
ANSI/IEEE Std. 802.11: 1999 (E) Part 11
-
-
-
5
-
-
0035507288
-
Wireless LAN access network architecture for mobile operators
-
November
-
J. Ala-Laurila, J. Mikkonen and J. Rinnemaa, "Wireless LAN access network architecture for mobile operators", IEEE Communications Magazine, 39(11):82-89, November 2001.
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.11
, pp. 82-89
-
-
Ala-Laurila, J.1
Mikkonen, J.2
Rinnemaa, J.3
-
6
-
-
0042474493
-
Integration of 802.11 and third-generation wireless data networks
-
M. Buddhikot, G. Chandrannmenon, S. Han, Y.W. Lee, S. Miller and L. Salgarelli, "Integration of 802.11 and Third-Generation Wireless Data Networks", IEEE INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 1, pp. 503-512, 2003.
-
(2003)
IEEE INFOCOM 2003, Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.1
, pp. 503-512
-
-
Buddhikot, M.1
Chandrannmenon, G.2
Han, S.3
Lee, Y.W.4
Miller, S.5
Salgarelli, L.6
-
7
-
-
0037364461
-
Integrating wireless LAN and cellular data for the enterprise
-
H. Luo, Z. Jiang, B. J. Kim, N.K. Shankaranarayanan and P. Henry, "Integrating Wireless LAN and Cellular Data for the Enterprise", IEEE Internet Computing, Vol. 7, No. 2, pp. 25-33, 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.2
, pp. 25-33
-
-
Luo, H.1
Jiang, Z.2
Kim, B.J.3
Shankaranarayanan, N.K.4
Henry, P.5
-
8
-
-
0034467609
-
On the cost of virtual private networks
-
R. Cohen and G. Kaempfer, On the Cost of Virtual Private Networks, IEEE/ACM Transactions on Networking, Vol. 8, No. 6, pp. 775-784, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.6
, pp. 775-784
-
-
Cohen, R.1
Kaempfer, G.2
-
9
-
-
0742317701
-
Virtual private networks
-
R. Venkateswaran, "Virtual Private Networks", IEEE Potentials, Vol. 20, No. 1, pp. 11-15, 2001.
-
(2001)
IEEE Potentials
, vol.20
, Issue.1
, pp. 11-15
-
-
Venkateswaran, R.1
-
11
-
-
0003477171
-
Using the fluhrer, mantin, and shamir attack to break WEP
-
A. Stubblefield, J. Ioannidis and A. D. Rubin, "Using the Fluhrer, Mantin, and Shamir Attack to Break WEP", AT&T Labs Technical Report TD-4ZCPZZ, 2001.
-
(2001)
AT&T Labs Technical Report
, vol.TD-4ZCPZZ
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.D.3
-
15
-
-
0037376798
-
Introduction of the asymmetric Cryptography in GSM, GPRS, UMTS, and Its public key infrastructure integration
-
C.F. Grecas, S.I. Maniatis and I.S. Venieris, "Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration", Mobile Networks and Applications, Vol. 8, No. 2, pp. 145-150, 2003.
-
(2003)
Mobile Networks and Applications
, vol.8
, Issue.2
, pp. 145-150
-
-
Grecas, C.F.1
Maniatis, S.I.2
Venieris, I.S.3
-
17
-
-
9144271462
-
-
Advanced Security for Personal Communication Technologies (ASPeCT), http://www.esat.kuleuven.ac.be/cosic/aspect/aspect.html, 1998
-
Advanced Encryption Standard (AES), http://csrc.nist.gov/CryptoToolkit/aes/, 2001. Advanced Security for Personal Communication Technologies (ASPeCT), http://www.esat.kuleuven.ac.be/cosic/aspect/aspect.html, 1998.
-
(2001)
-
-
-
18
-
-
0034248479
-
Temporary mobile user certificate for mobile information services in UMTS
-
August
-
B.R. Lee, K.A. Chang and T.Y. Kim, "Temporary Mobile User Certificate for Mobile Information Services in UMTS", IEICE transactions on Communications, Vol. E83-B, No. 8, pp. 1880-1886, August 2000.
-
(2000)
IEICE Transactions on Communications
, vol.E83-B
, Issue.8
, pp. 1880-1886
-
-
Lee, B.R.1
Chang, K.A.2
Kim, T.Y.3
-
21
-
-
0003218526
-
Remote authentication dial in user service (RADIUS)
-
June
-
C. Rigney, S. Willens, A. Rubens and W. Simpson, "Remote Authentication Dial in User Service (RADIUS)", IETF RFC 2865, June 2000.
-
(2000)
IETF RFC
, vol.2865
-
-
Rigney, C.1
Willens, S.2
Rubens, A.3
Simpson, W.4
-
22
-
-
0003218499
-
PPP extensible authentication protocol (EAP)
-
March
-
L. Blunk and J. Vollbrecht, "PPP Extensible Authentication Protocol (EAP)", IETF RFC 2284, March 1998.
-
(1998)
IETF RFC
, vol.2284
-
-
Blunk, L.1
Vollbrecht, J.2
-
23
-
-
0038065851
-
PPP EAP TLS authentication protocol
-
October
-
B. Aboba, and D. Simon, "PPP EAP TLS Authentication Protocol", IETF RFC 2716, October 1999.
-
(1999)
IETF RFC
, vol.2716
-
-
Aboba, B.1
Simon, D.2
-
25
-
-
33645677272
-
Protected EAP protocol (PEAP)
-
February
-
H. Andersson, S. Josefsson, G. Zorn, D. Simon and A. Palekar, "Protected EAP Protocol (PEAP)", IETF draft-josefsson-pppext-eap-tls-eap-02, February 2002.
-
(2002)
IETF Draft-josefsson-pppext-eap-tls-eap-02
-
-
Andersson, H.1
Josefsson, S.2
Zorn, G.3
Simon, D.4
Palekar, A.5
-
28
-
-
0012446629
-
Generic AAA architecture
-
August
-
de C. Laat, G. Gross, L. Gommans and J. Vollbrecht and D. Spence, "Generic AAA Architecture", IETF RFC 2903, August 2000.
-
(2000)
IETF RFC
, vol.2903
-
-
De Laat, C.1
Gross, G.2
Gommans, L.3
Vollbrecht, J.4
Spence, D.5
-
29
-
-
0141518232
-
On the security methods for protecting password transmission
-
Y.M. Tseng, J.K. Jan and H.Y. Chien, "On the Security Methods for Protecting Password Transmission", Informatica, Vol. 12, No. 3, pp. 469-476, 2001.
-
(2001)
Informatica
, vol.12
, Issue.3
, pp. 469-476
-
-
Tseng, Y.M.1
Jan, J.K.2
Chien, H.Y.3
-
30
-
-
0036643547
-
Robust generalized MQV key agreement protocol without using one-way hash functions
-
Y.M. Tseng, "Robust Generalized MQV Key Agreement Protocol Without Using One-way Hash Functions", Computer Standards & Interfaces, Vol. 24, No. 3, pp. 241-246, 2002.
-
(2002)
Computer Standards & Interfaces
, vol.24
, Issue.3
, pp. 241-246
-
-
Tseng, Y.M.1
-
31
-
-
0037942544
-
Cryptanalysis of mutual authentication and key exchange for low power wireless communications
-
May
-
K. Shim, "Cryptanalysis of Mutual Authentication and Key Exchange for Low Power Wireless Communications", IEEE Communications Letters, Vol. 7, No. 5, pp. 248-250, May 2003.
-
(2003)
IEEE Communications Letters
, vol.7
, Issue.5
, pp. 248-250
-
-
Shim, K.1
-
32
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password Authentication with Insecure Communication", Communication of ACM, Vol. 24, No. 11, pp. 770-772, 1981.
-
(1981)
Communication of ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
33
-
-
0033364756
-
Authentication protocols with nonrepudiation services in personal communication systems
-
H.Y. Lin and L. Harn, "Authentication Protocols with Nonrepudiation Services in Personal Communication Systems", IEEE Communications Letters, Vol. 3, No. 8, pp. 236-238, 1999.
-
(1999)
IEEE Communications Letters
, vol.3
, Issue.8
, pp. 236-238
-
-
Lin, H.Y.1
Harn, L.2
-
35
-
-
0036980638
-
Your 802.11 wireless network has no clothes
-
W.A. Arbaugh, N. Shankar and Y.C.J. Wan, "Your 802.11 Wireless Network Has No Clothes", IEEE Wireless Communications, Vol. 9, No. 6, pp. 44-51, 2002.
-
(2002)
IEEE Wireless Communications
, vol.9
, Issue.6
, pp. 44-51
-
-
Arbaugh, W.A.1
Shankar, N.2
Wan, Y.C.J.3
-
36
-
-
9144248802
-
-
Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Medium Access Method (MAC) Security Enhancements, IEEE P802.11i/D3.0, http://standards.ieee.org/reading/ieee/std/lanman/drafts/P802.11i.pdf
-
Sun Microsystems, http://java.sun.com Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Medium Access Method (MAC) Security Enhancements, IEEE P802.11i/D3.0, http://standards.ieee.org/reading/ieee/std/lanman/drafts/P802.11i.pdf.
-
-
-
-
38
-
-
0001849866
-
The status of MD5 after a recent attack
-
H. Dobbertin, "The status of MD5 after a Recent Attack", CryptoBytes, Vol. 2, No. 2, pp. 1-6, 1996.
-
(1996)
CryptoBytes
, vol.2
, Issue.2
, pp. 1-6
-
-
Dobbertin, H.1
-
39
-
-
84936033986
-
-
The Digital Signature Standard (DSA) proposed by NIST, Communication of ACM, vol. 35, No. 7, pp. 36-40, 1992.
-
(1992)
Communication of ACM
, vol.35
, Issue.7
, pp. 36-40
-
-
|