메뉴 건너뛰기




Volumn 29, Issue 3-4 SPEC.ISS., 2004, Pages 161-190

Secure service and network framework for mobile ethernet

Author keywords

3GPP; 4G; Access control; Authentication; Authentication protocol; Beyond 3G; Handover certificate; MIDP; Mutual authentication; Security; Security context; Self delegation; Smart card; WLAN

Indexed keywords

CRYPTOGRAPHY; INFORMATION ANALYSIS; PROJECT MANAGEMENT; SECURITY OF DATA; SMART CARDS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 9144272434     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1023/B:WIRE.0000047061.87235.8b     Document Type: Review
Times cited : (12)

References (43)
  • 1
    • 9144239058 scopus 로고    scopus 로고
    • http://www.itu.int/home/imt.html.
  • 2
    • 9144226610 scopus 로고    scopus 로고
    • http://www.3gpp.org/.
  • 5
    • 9144223470 scopus 로고    scopus 로고
    • Mobile information device profile (MIDP) 2.0
    • "Mobile Information Device Profile (MIDP) 2.0", JSR 118, http://jcp.org/jsr/detail/118.jsp.
    • JSR , vol.118
  • 6
    • 84957707067 scopus 로고    scopus 로고
    • Self-delegation with controlled propagation -or- What if you lose your laptop
    • Springer LNCS
    • O. Goldreich, B. Pftzmann and R.L. Rivest, "Self-delegation with Controlled Propagation -or- What If You Lose Your Laptop", in Proceedings of Crypto 98, Springer LNCS, Vol. 1462, pp. 153-168, 1998.
    • (1998) Proceedings of Crypto 98 , vol.1462 , pp. 153-168
    • Goldreich, O.1    Pftzmann, B.2    Rivest, R.L.3
  • 7
    • 85032463527 scopus 로고
    • Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms
    • Springer LNCS
    • D. Chaum, "Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms", in Proceedings of Auscrypt '90, Springer LNCS, Vol. 453, pp. 246-264, 1990.
    • (1990) Proceedings of Auscrypt '90 , vol.453 , pp. 246-264
    • Chaum, D.1
  • 8
    • 0027005999 scopus 로고
    • Achieving electronic privacy
    • August
    • D. Chaum, "Achieving Electronic Privacy", Scientific American, pp. 96-101, August 1976.
    • (1976) Scientific American , pp. 96-101
    • Chaum, D.1
  • 9
    • 0842267408 scopus 로고    scopus 로고
    • The overview of the new generation mobile communication system and the role of software defined radio technology
    • December
    • H. Harada, M. Kuroda, H. Morikawa, H. Wakana and F. Adachi, "The Overview of the New Generation Mobile Communication System and the Role of Software Defined Radio Technology", IEICE Transactions on Communication, col. E86-B, no. 12, pp. 3374-3384, December 2003.
    • (2003) IEICE Transactions on Communication , vol.E86-B , Issue.12 , pp. 3374-3384
    • Harada, H.1    Kuroda, M.2    Morikawa, H.3    Wakana, H.4    Adachi, F.5
  • 11
    • 0003291368 scopus 로고    scopus 로고
    • Neighbor discovery for IP version 6 (IPv6)
    • IETF, December
    • T. Narten, E. Nordmark and W. Simpson, "Neighbor Discovery for IP Version 6 (IPv6)", RFC 2461, IETF, December 1998.
    • (1998) RFC , vol.2461
    • Narten, T.1    Nordmark, E.2    Simpson, W.3
  • 13
    • 9144230440 scopus 로고    scopus 로고
    • Design of secure mobile application on cellular phones
    • December
    • M. Kuroda, M. Yoshida, S. Sakurai and T. Munaka, "Design of Secure Mobile Application on Cellular Phones", PCM2002, December 2002.
    • (2002) PCM2002
    • Kuroda, M.1    Yoshida, M.2    Sakurai, S.3    Munaka, T.4
  • 14
    • 9144227241 scopus 로고    scopus 로고
    • Mobile information device profile for the J2ME™ platform
    • "Mobile Information Device Profile for the J2ME™ Platform", JSR 37, http://jcp.org/jsr/detail/37.jsp.
    • JSR , vol.37
  • 15
    • 9144253635 scopus 로고    scopus 로고
    • J2ME™ connected, limited device configuration
    • "J2ME™ Connected, Limited Device Configuration", JSR 30, http://jcp.org/jsr/detail/30.jsp.
    • JSR , vol.30
  • 17
    • 9144267521 scopus 로고    scopus 로고
    • A secure service architecture for beyond 3G wireless network
    • October
    • M. Yoshida, M. Kuroda, S. Kiyomoto and T. Tanaka, "A Secure Service Architecture for Beyond 3G Wireless Network", WPMC2003, V2, pp. 579-583, October 2003.
    • (2003) WPMC2003 , vol.2 , pp. 579-583
    • Yoshida, M.1    Kuroda, M.2    Kiyomoto, S.3    Tanaka, T.4
  • 18
    • 9144240831 scopus 로고    scopus 로고
    • Design and evaluation of security architecture for beyond 3G mobile terminals
    • October
    • S. Kiyomoto, T. Tanaka, M. Yoshida and M. Kuroda, "Design and Evaluation of Security Architecture for Beyond 3G Mobile Terminals", WPMC2003, V1, pp. 191-195, October 2003.
    • (2003) WPMC2003 , vol.1 , pp. 191-195
    • Kiyomoto, S.1    Tanaka, T.2    Yoshida, M.3    Kuroda, M.4
  • 19
    • 9144253633 scopus 로고    scopus 로고
    • Double stuff security for beyond 30 wireless network
    • October
    • M. Kuroda, M. Yoshida and R. Ono, "Double Stuff Security for Beyond 30 Wireless Network", WPMC2003, V2, pp. 327-331, October 2003.
    • (2003) WPMC2003 , vol.2 , pp. 327-331
    • Kuroda, M.1    Yoshida, M.2    Ono, R.3
  • 20
    • 84881195282 scopus 로고    scopus 로고
    • Public key cryptography for the financial services industry: Elliptic curve digital signature algorithm (ECDSA)
    • "Public Key Cryptography for the Financial Services Industry: Elliptic Curve Digital Signature Algorithm (ECDSA)", ANSI X9.62, 1999.
    • (1999) ANSI X9.62
  • 22
    • 0003629991 scopus 로고
    • NIST, FIPS 180-1, April
    • "Secure Hash Standard", NIST, FIPS 180-1, April 1995.
    • (1995) Secure Hash Standard
  • 23
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • IETF, February
    • H. Krawczyk, M. Bellare and R. Canetti, "HMAC: Keyed-hashing for Message Authentication", RFC 2104, IETF, February 1997.
    • (1997) RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 24
    • 4244000104 scopus 로고    scopus 로고
    • Draft Revised ITU-T Recommendation X.509, ISO/IEC 9594-8
    • "Public-key and Attribute Certificate Frameworks", Draft Revised ITU-T Recommendation X.509, ISO/IEC 9594-8, 2000.
    • (2000) Public-key and Attribute Certificate Frameworks
  • 25
    • 84948391696 scopus 로고    scopus 로고
    • A model of certificate revocation
    • December
    • D.A. Cooper, "A Model of Certificate Revocation", in Proceedings of ACSAC '99, December 1999.
    • (1999) Proceedings of ACSAC '99
    • Cooper, D.A.1
  • 27
    • 0003344055 scopus 로고    scopus 로고
    • X.509 internet public key infrastructure online certificate status protocol - OCSP
    • IETF, June
    • M. Myers, R. Ankney, A. Malpani, S. Galperin and C. Adams, "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP", RFC 2560, IETF, June 1999.
    • (1999) RFC , vol.2560
    • Myers, M.1    Ankney, R.2    Malpani, A.3    Galperin, S.4    Adams, C.5
  • 28
    • 84957707067 scopus 로고    scopus 로고
    • Self-delegation with controlled propagation -or- what if you lose your laptop
    • Springer LNCS
    • O. Goldreich, B. Pftizmann and R.L. Rivest, "Self-Delegation with Controlled Propagation -or- What If You Lose Your Laptop", in Proceedings of Crypto 98, Springer LNCS, Vol. 1462, pp.153-168, 1998.
    • (1998) Proceedings of Crypto 98 , vol.1462 , pp. 153-168
    • Goldreich, O.1    Pftizmann, B.2    Rivest, R.L.3
  • 29
    • 0003218526 scopus 로고    scopus 로고
    • Remote authentication dial in user service (RADIUS)
    • IETF, June
    • C. Rigney and S. Willens, "Remote Authentication Dial in User Service (RADIUS)", RFC 2865, IETF, June 2000.
    • (2000) RFC , vol.2865
    • Rigney, C.1    Willens, S.2
  • 31
    • 1642379048 scopus 로고    scopus 로고
    • EAP tunneled TLS authentication protocol (EAP-TTLS)
    • draft-ietf-pppext-eap-ttls-02.txt, November
    • P. Funk and S.B. Wilson, "EAP Tunneled TLS Authentication Protocol (EAP-TTLS)", Internet-Draft, draft-ietf-pppext-eap-ttls-02.txt, November 2002.
    • (2002) Internet-draft
    • Funk, P.1    Wilson, S.B.2
  • 32
    • 9144237895 scopus 로고    scopus 로고
    • Interworking and handover mechanism between WLAN and UMTS
    • Artech House Publishers, November
    • M. Alam, "Interworking and Handover Mechanism between WLAN and UMTS", Wireless IP and Building the Mobile Internet, Artech House Publishers, November 2002.
    • (2002) Wireless IP and Building the Mobile Internet
    • Alam, M.1
  • 34
    • 9144268709 scopus 로고    scopus 로고
    • Fast handoffs for mobile IPv6
    • MIPv6 HandofT Design Team, draft-ietf-mobileip-fast-mipv6-01.txt, April
    • MIPv6 HandofT Design Team, "Fast Handoffs for Mobile IPv6", Internet-Draft, draft-ietf-mobileip-fast-mipv6-01.txt, April 2001.
    • (2001) Internet-draft
  • 39
    • 9144270299 scopus 로고    scopus 로고
    • A study on IP mobility service provisioning in cooperation with IEEE 802.1X authentication
    • MBL No. 24-009, March
    • H. Yokota, T. Kubo and A. Idoue, "A Study on IP Mobility Service Provisioning in Cooperation with IEEE 802.1X Authentication", IPSJ SIGNotes, MBL No. 24-009, March 2003.
    • (2003) IPSJ SIGNotes
    • Yokota, H.1    Kubo, T.2    Idoue, A.3
  • 40


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.