DRKH: A Power Efficient Encryption Protocol forWireless Devices
暂无分享,去创建一个
Magda B. Fayek | Ahmad M. Kholaif | Hoda Baraka | Hussein Sherif Eissa | H. S. Eissa | H. Baraka | M. Fayek
[1] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[2] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[3] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[4] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[5] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[6] K. Srinivasan,et al. Performance of state based key hop (SBKH) protocol for security on wireless networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[7] Christian Gehrmann,et al. Manual authentication for wireless devices , 2004 .
[8] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[9] Virtual Bridged,et al. IEEE Standards for Local and Metropolitan Area Networks: Specification for 802.3 Full Duplex Operation , 1997, IEEE Std 802.3x-1997 and IEEE Std 802.3y-1997 (Supplement to ISO/IEC 8802-3: 1996/ANSI/IEEE Std 802.3, 1996 Edition).
[10] William A. Arbaugh,et al. An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .
[11] Pat R. Calhoun,et al. RADIUS Extensions , 2000, RFC.