Server based PMK generation with identity protection for wireless networks
暂无分享,去创建一个
[1] Angelos D. Keromytis,et al. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols , 2001, Security Protocols Workshop.
[2] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[3] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[4] Stefan Lucks,et al. Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys , 1997, Security Protocols Workshop.
[5] Takahiro Kiuchi. Report on the Internet Society Symposium on Network and Distributed System Security , 1999 .
[6] Christoph G. Günther,et al. An Identity-Based Key-Exchange Protocol , 1990, EUROCRYPT.
[7] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[8] Sarvar Patel,et al. Password-authenticated key exchange based on RSA , 2000, International Journal of Information Security.
[9] Hugo Krawczyk,et al. SKEME: a versatile secure key exchange mechanism for Internet , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[10] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[11] Ari Juels,et al. $evwu Dfw , 1998 .
[12] Angelos D. Keromytis,et al. Efficient, DoS-resistant, secure key exchange for internet protocols , 2001, CCS '02.
[13] Sarvar Patel,et al. Password-Authenticated Key Exchange Based on RSA , 2000, ASIACRYPT.
[14] Feng Zhu,et al. Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks , 2002, ISC.
[15] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[16] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[17] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .